{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:18:15Z","timestamp":1760660295343,"version":"build-2065373602"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01117-w","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T15:23:05Z","timestamp":1756912985000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient feature selection strategy based on bio-inspired algorithms for preventing cyber attacks in vehicular networks"],"prefix":"10.1007","volume":"24","author":[{"given":"Vinicius A.","family":"Pedro","sequence":"first","affiliation":[]},{"given":"Gabriel N.","family":"Missima","sequence":"additional","affiliation":[]},{"given":"Murillo F.","family":"Bouzon","sequence":"additional","affiliation":[]},{"given":"Paulo S.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"key":"1117_CR1","doi-asserted-by":"crossref","unstructured":"R.\u00a0Gangula, M.\u00a0M. Vutukuru, R.\u00a0K. M., Network intrusion detection method using stacked bilstm elastic regression classifier with aquila optimizer algorithm for internet of things (iot), International Journal on Recent and Innovation Trends in Computing and Communication (2023). https:\/\/api.semanticscholar.org\/CorpusID:258394172","DOI":"10.17762\/ijritcc.v11i2s.6035"},{"key":"1117_CR2","doi-asserted-by":"crossref","unstructured":"K.\u00a0S. Wilson, M.\u00a0A. Kiy, Some fundamental cybersecurity concepts, IEEE Access 2 (2014) 116\u2013124. https:\/\/api.semanticscholar.org\/CorpusID:19315593","DOI":"10.1109\/ACCESS.2014.2305658"},{"key":"1117_CR3","doi-asserted-by":"crossref","unstructured":"X.\u00a0Chen, T.\u00a0Wang, X.\u00a0Lin, D.\u00a0E. Hinde, Q.\u00a0Yan, Z.\u00a0Zeljana, The potential of the digital economy: A comparative assessment of key countries\u2019 cybersecurity, International Journal of Education and Humanities (2023). https:\/\/api.semanticscholar.org\/CorpusID:265335914","DOI":"10.54097\/ijeh.v11i1.12740"},{"key":"1117_CR4","doi-asserted-by":"crossref","unstructured":"M.\u00a0F. Safitra, M.\u00a0Lubis, H.\u00a0Fakhrurroja, Counterattacking cyber threats: A framework for the future of cybersecurity, Sustainability (2023). https:\/\/api.semanticscholar.org\/CorpusID:261589966","DOI":"10.3390\/su151813369"},{"key":"1117_CR5","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s10586-015-0527-8","volume":"19","author":"S-H Kang","year":"2016","unstructured":"Kang, S.-H., Kim, K.J.: A feature selection approach to find optimal feature subsets for the network intrusion detection system. Clust. Comput. 19, 325\u2013333 (2016). (https:\/\/api.semanticscholar.org\/CorpusID:17989921)","journal-title":"Clust. Comput."},{"key":"1117_CR6","unstructured":"Chapple, M., Stewart, J.\u00a0M., Gibson, D.: Isc)2 cissp certified information systems security professional official study guide (2018). https:\/\/api.semanticscholar.org\/CorpusID:196198058"},{"key":"1117_CR7","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.\u00a0M., Kim, H.\u00a0K.: Gids: Gan based intrusion detection system for in-vehicle network, 2018 16th Annual Conference on Privacy, Security and Trust (PST) (2018) 1\u20136. https:\/\/api.semanticscholar.org\/CorpusID:53234493","DOI":"10.1109\/PST.2018.8514157"},{"key":"1117_CR8","doi-asserted-by":"crossref","unstructured":"Lee, H., Jeong, S.\u00a0H., Kim, H.\u00a0K.: Otids: A novel intrusion detection system for in-vehicle network by using remote frame, 2017 15th Annual Conference on Privacy, Security and Trust (PST) (2017) 57\u20135709. https:\/\/api.semanticscholar.org\/CorpusID:52916016","DOI":"10.1109\/PST.2017.00017"},{"key":"1117_CR9","first-page":"52","volume":"14","author":"ML Han","year":"2018","unstructured":"Han, M.L., Kwak, B.I., Kim, H.K.: Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14, 52\u201363 (2018). (https:\/\/api.semanticscholar.org\/CorpusID:54455829)","journal-title":"Veh. Commun."},{"key":"1117_CR10","doi-asserted-by":"crossref","unstructured":"Song, H.\u00a0M., Kim, H.\u00a0R., Kim, H.\u00a0K.: Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network, 2016 International Conference on Information Networking (ICOIN) (2016) 63\u201368. https:\/\/api.semanticscholar.org\/CorpusID:9333718","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"1117_CR11","doi-asserted-by":"crossref","unstructured":"Kang, M.-J., Kang, J.-W.: Intrusion detection system using deep neural network for in-vehicle network security, PLoS ONE 11 (2016). https:\/\/api.semanticscholar.org\/CorpusID:18256723","DOI":"10.1371\/journal.pone.0155781"},{"key":"1117_CR12","doi-asserted-by":"crossref","first-page":"477","DOI":"10.3233\/JCS-230027","volume":"32","author":"S Sharmin","year":"2024","unstructured":"Sharmin, S., Mansor, H., Kadir, A.F.A., Aziz, N.A.: Benchmarking frameworks and comparative studies of controller area network (can) intrusion detection systems: A review. J. Comput. Secur. 32, 477\u2013507 (2024). (https:\/\/api.semanticscholar.org\/CorpusID:267627737)","journal-title":"J. Comput. Secur."},{"key":"1117_CR13","doi-asserted-by":"crossref","first-page":"70651","DOI":"10.1109\/ACCESS.2020.2986217","volume":"8","author":"S Sarvari","year":"2020","unstructured":"Sarvari, S., Sani, N.F.M., Hanapi, Z.M., Abdullah, M.T.: An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8, 70651\u201370663 (2020)","journal-title":"IEEE Access"},{"key":"1117_CR14","doi-asserted-by":"crossref","unstructured":"Naseri, T.\u00a0S., Gharehchopogh, F.\u00a0S.: A feature selection based on the farmland fertility algorithm for improved intrusion detection systems, Journal of Network and Systems Management 30 (2022). https:\/\/api.semanticscholar.org\/CorpusID:247574702","DOI":"10.1007\/s10922-022-09653-9"},{"key":"1117_CR15","doi-asserted-by":"crossref","unstructured":"Gharaee, H., Hosseinvand, H.: A new feature selection ids based on genetic algorithm and svm, 2016 8th International Symposium on Telecommunications (IST) (2016) 139\u2013144. https:\/\/api.semanticscholar.org\/CorpusID:22722233","DOI":"10.1109\/ISTEL.2016.7881798"},{"key":"1117_CR16","doi-asserted-by":"crossref","unstructured":"Verma, A., Ranga, V.: Elnids: Ensemble learning based network intrusion detection system for rpl based internet of things, in: International Conference on Internet of Things, pp. 1\u20136 (2019)","DOI":"10.1109\/IoT-SIU.2019.8777504"},{"key":"1117_CR17","doi-asserted-by":"crossref","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464\u201332476 (2020)","journal-title":"IEEE Access"},{"key":"1117_CR18","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Feature analysis for machine learning-based iot intrusion detection, (2021). https:\/\/api.semanticscholar.org\/CorpusID:253582165","DOI":"10.21203\/rs.3.rs-2035633\/v1"},{"key":"1117_CR19","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s10462-015-9428-8","volume":"44","author":"R Diao","year":"2015","unstructured":"Diao, R., Shen, Q.: Nature inspired feature selection meta-heuristics. Artif. Intell. Rev. 44, 311\u2013340 (2015)","journal-title":"Artif. Intell. Rev."},{"key":"1117_CR20","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"SM Mirjalili","year":"2016","unstructured":"Mirjalili, S.M., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51\u201367 (2016)","journal-title":"Adv. Eng. Softw."},{"key":"1117_CR21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"SM Mirjalili","year":"2014","unstructured":"Mirjalili, S.M., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014). (https:\/\/api.semanticscholar.org\/CorpusID:15532140)","journal-title":"Adv. Eng. Softw."},{"key":"1117_CR22","doi-asserted-by":"crossref","unstructured":"Yang, X.-S.: Firefly algorithms for multimodal optimization, in: Symposium on Stochastic Algorithms: Foundations and Applications, (2009). https:\/\/api.semanticscholar.org\/CorpusID:34975975","DOI":"10.1007\/978-3-642-04944-6_14"},{"key":"1117_CR23","volume":"100","author":"M Rostami","year":"2020","unstructured":"Rostami, M., Berahmand, K., Forouzandeh, S.: Review of swarm intelligence-based feature selection methods. Eng. Appl. Artif. Intell. 100, 104210 (2020)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1117_CR24","doi-asserted-by":"crossref","unstructured":"Molina, D., Poyatos, J., Ser, J.\u00a0D., Garc\u00eda, S., Hussain, A., Herrera, F.: Comprehensive taxonomies of nature- and bio-inspired optimization: Inspiration versus algorithmic behavior, critical analysis recommendations, Cognitive Computation 1\u201343 (2020)","DOI":"10.1007\/s12559-020-09730-8"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01117-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01117-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01117-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:09Z","timestamp":1760614689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01117-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1117"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01117-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"7 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"203"}}