{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:42:51Z","timestamp":1770331371715,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031714696","type":"print"},{"value":"9783031714702","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71470-2_7","type":"book-chapter","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T17:10:36Z","timestamp":1731431436000},"page":"78-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Robust Internet of\u00a0Vehicles Security: An Edge Node-Based Machine Learning Framework for\u00a0Attack Classification"],"prefix":"10.1007","author":[{"given":"Liehuang","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Awais","family":"Bilal","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Sharif","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Anand, M., Kumar, S.P., Selvi, M., Kumar, S.S.S., Ram, G., Kannan, A.: Deep learning model based ids for detecting cyber attacks in IoT based smart vehicle network. In: 2023 International Conference on Sustainable Computing and Data Communication Systems, pp. 281\u2013286 (2023)","DOI":"10.1109\/ICSCDS56580.2023.10104996"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Attar, A.E., Wehby, A., Chbib, F., Mehrez, H.A., Fadlallah, A., Hachem, J., Khatoun, R.: Analysis of machine learning algorithms for DDoS attack detection in connected cars environment. In: 2023 Eighth International Conference on Mobile And Secure Services, pp. 1\u20137 (2023)","DOI":"10.1109\/MobiSecServ58080.2023.10329152"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/jsan11010006","volume":"11","author":"D Basavaraj","year":"2022","unstructured":"Basavaraj, D., Tayeb, S.: Towards a lightweight intrusion detection framework for in-vehicle networks. J. Sens. Actuator Netw. 11, 6 (2022)","journal-title":"J. Sens. Actuator Netw."},{"key":"7_CR4","unstructured":"Chen, Y., Zhang, Y., Maharjan, S.: Deep learning for secure mobile edge computing. arXiv abs\/1709.08025 (2017)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Churcher, A., Ullah, R., Ahmad, J., Rehman, S., Masood, F., Gogate, M., et al.: An experimental analysis of attack classification using machine learning in IoT networks. Sensors 21 (2021)","DOI":"10.3390\/s21020446"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"11169","DOI":"10.1109\/TVT.2020.3008265","volume":"69","author":"C Dai","year":"2020","unstructured":"Dai, C., Liu, X., Chen, W., Lai, C.F.: A low-latency object detection algorithm for the edge devices of IoV systems. IEEE Trans. Veh. Technol. 69, 11169\u201311178 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Doan, H.H., Paul, A.A., Zeindlinger, H., Zhang, Y., Khan, S., Svetinovi\u0107, D.: Threat modeling for ML-based topology prediction in vehicular edge computing architecture. In: 2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 0523\u20130530 (2023)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361465"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Gou, W., Zhang, H., Zhang, R.: Multi-classification and tree-based ensemble network for the intrusion detection system in the internet of vehicles. Sensors 23 (2023)","DOI":"10.3390\/s23218788"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"14787","DOI":"10.1109\/JIOT.2021.3071362","volume":"8","author":"H Grover","year":"2021","unstructured":"Grover, H., Alladi, T., Chamola, V., Singh, D., Choo, K.: Edge computing and deep learning enabled secure multitier network for internet of vehicles. IEEE Internet Things J. 8, 14787\u201314796 (2021)","journal-title":"IEEE Internet Things J."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Hong, L., Wehbi, K., Alsalah, T.H.: Hybrid feature selection for efficient detection of DDoS attacks in IoT. In: Proceedings of the 2022 6th International Conference on Deep Learning Technologies (2022)","DOI":"10.1145\/3556677.3556687"},{"key":"7_CR12","unstructured":"Manokaran, J., Vairavel, G.: An empirical comparison of machine learning algorithms for attack detection in internet of things edge. ECS Trans. (2022)"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"5356","DOI":"10.1109\/ACCESS.2016.2603219","volume":"4","author":"O Kaiwartya","year":"2016","unstructured":"Kaiwartya, O., et al.: Internet of vehicles: motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4, 5356\u20135373 (2016)","journal-title":"IEEE Access"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","volume":"119","author":"R Kozik","year":"2018","unstructured":"Kozik, R., Chora\u015b, M., Ficco, M., Palmieri, F.: A scalable distributed machine learning approach for attack detection in edge computing environments. J. Parallel Distrib. Comput. 119, 18\u201326 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Li, W., Li, F., Sharif, K., Wang, Y.: When user interest meets data quality: a novel user filter scheme for mobile crowd sensing. In: 2017 IEEE 23rd International Conference on Parallel and Distributed Systems, pp. 97\u2013104. IEEE (2017)","DOI":"10.1109\/ICPADS.2017.00024"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Merenda, M., Porcaro, C., Iero, D.: Edge machine learning for AI-enabled IoT devices: a review. Sensors 20 (2020)","DOI":"10.3390\/s20092533"},{"key":"7_CR17","first-page":"80","volume":"44","author":"S Mohammadi","year":"2019","unstructured":"Mohammadi, S., Mirvaziri, H., Ahsaee, M.G., Karimipour, H.: Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80\u201388 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Patil, P., Attar, V.: Intelligent detection of major network attacks using feature selection methods. In: Proceedings of the International Conference on Soft Computing for Problem Solving, pp. 671\u2013679 (2012)","DOI":"10.1007\/978-81-322-0491-6_61"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1049\/iet-net.2018.5206","volume":"9","author":"M Roopak","year":"2020","unstructured":"Roopak, M., Tian, G., Chambers, J.: Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw. 9, 120\u2013127 (2020)","journal-title":"IET Netw."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, S., Kaushik, B.: A survey on internet of vehicles: Appl. Secur. Issues Solut. Veh. Commun. 20 (2019)","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2020","unstructured":"Tian, Z., Luo, C., Qiu, J., Du, X., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Ind. Inf. 16, 1963\u20131971 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Ullah, S., et al.: HDL-IDS: a hybrid deep learning architecture for intrusion detection in the internet of vehicles. Sensors 22 (2022)","DOI":"10.3390\/s22041340"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, Y., Song, J., Cheng, H.: IoV vulnerability classification algorithm based on knowledge graph. Electronics (2023)","DOI":"10.3390\/electronics12234749"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1109\/TII.2019.2962844","volume":"16","author":"T Wang","year":"2020","unstructured":"Wang, T., Cao, Z., Wang, S., Wang, J., Qi, L., Liu, A., et al.: Privacy-enhanced data collection based on deep learning for Internet of Vehicles. IEEE Trans. Ind. Inf. 16, 6663\u20136672 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge computing security: state of the art and challenges. Proc. IEEE 107, 1608\u20131631 (2019)","journal-title":"Proc. IEEE"},{"issue":"7","key":"7_CR26","doi-asserted-by":"publisher","first-page":"5537","DOI":"10.1109\/JIOT.2021.3111739","volume":"9","author":"C Xu","year":"2021","unstructured":"Xu, C., Wang, N., Zhu, L., Zhang, C., Sharif, K., Wu, H.: Reliable and privacy-preserving top-k disease matching schemes for e-healthcare systems. IEEE Internet Things J. 9(7), 5537\u20135547 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TVT.2020.3046027","volume":"70","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Zhu, L., Xu, C., Sharif, K.: PRVB: achieving privacy-preserving and reliable vehicular crowdsensing via blockchain oracle. IEEE Trans. Veh. Technol. 70(1), 831\u2013843 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/JPROC.2019.2947490","volume":"108","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Letaief, K.: Mobile edge intelligence and computing for the Internet of Vehicles. Proc. IEEE 108, 246\u2013261 (2019)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71470-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:07:29Z","timestamp":1731434849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71470-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"ISBN":["9783031714696","9783031714702"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71470-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,13]]},"assertion":[{"value":"13 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}