{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T12:05:56Z","timestamp":1744977956561,"version":"3.37.3"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["6790-546285-2020","6790-546285-2020"],"award-info":[{"award-number":["6790-546285-2020","6790-546285-2020"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10922-023-09781-w","type":"journal-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T05:06:11Z","timestamp":1698815171000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BoostSec: Adaptive Attack Detection for Vehicular Networks"],"prefix":"10.1007","volume":"32","author":[{"given":"Marwa A.","family":"Elsayed","sequence":"first","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"issue":"2","key":"9781_CR1","first-page":"546","volume":"16","author":"J Petit","year":"2015","unstructured":"Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell Transp Syst 16(2), 546\u2013556 (2015)","journal-title":"IEEE Trans. Intell Transp Syst"},{"key":"9781_CR2","first-page":"77","volume-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces","author":"S Checkoway","year":"2011","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analyses of Automotive Attack Surfaces, pp. 77\u201392. Proc. of USENIX Security Symposium, San Francisco (2011)"},{"issue":"6","key":"9781_CR29","doi-asserted-by":"publisher","first-page":"6631","DOI":"10.1109\/TVT.2020.2984878","volume":"69","author":"J Kamel","year":"2020","unstructured":"Kamel, J., Ansari, M.R., Petit, J., Kaiser, A., Jemaa, I.B., Urien, P.: Simulation framework for misbehavior detection in vehicular networks. IEEE Trans. Veh. Technol. 69(6), 6631\u20136643 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9781_CR30","doi-asserted-by":"crossref","unstructured":"A. Le and C. Maple, \u201cShadows Don't Lie: n-Sequence Trajectory Inspection for Misbehaviour Detection and Classification in VANETs,\u201d Proc. of 2019 IEEE 90th Vehicular Technology Conference, (VTC2019-Fall), pp. 1\u20136, IEEE, 2019.","DOI":"10.1109\/VTCFall.2019.8891137"},{"issue":"8","key":"9781_CR31","doi-asserted-by":"publisher","first-page":"8871","DOI":"10.1109\/TVT.2020.2996620","volume":"69","author":"S Gyawali","year":"2020","unstructured":"Gyawali, S., Qian, Y., Hu, R.Q.: Machine learning and reputation based misbehavior detection in vehicular communication networks. IEEE Trans. on Veh. Technology 69(8), 8871\u20138885 (2020)","journal-title":"IEEE Trans. on Veh. Technology"},{"issue":"6","key":"9781_CR32","doi-asserted-by":"publisher","first-page":"4991","DOI":"10.1109\/JIOT.2020.3035035","volume":"8","author":"P Sharma","year":"2021","unstructured":"Sharma, P., Liu, H.: A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J. 8(6), 4991\u20134999 (2021)","journal-title":"IEEE Internet Things J."},{"key":"9781_CR33","doi-asserted-by":"crossref","unstructured":"S. So, P. Sharma, and J. Petit, \u201cIntegrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET,\u201d Proc. of 2018 17th IEEE International Conference on Machine Learning and Applications, (ICMLA), pp. 564\u2013571, IEEE, 2018.","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"9781_CR34","doi-asserted-by":"publisher","first-page":"159119","DOI":"10.1109\/ACCESS.2019.2950805","volume":"7","author":"FA Ghaleb","year":"2019","unstructured":"Ghaleb, F.A., Maarof, M.A., Zainal, A., Al-Rimy, B.A.S., Saeed, F., Al-Hadhrami, T.: Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network. IEEE Access 7, 159119\u2013159140 (2019)","journal-title":"IEEE Access"},{"key":"9781_CR35","doi-asserted-by":"crossref","unstructured":"A. Uprety, D. B. Rawat, and J. Li, \u201cPrivacy Preserving Misbehavior Detection in IoV using Federated Machine Learning,\u201d Proc. of 2021 IEEE 18th Annual Consumer Communications Networking Conference, (CCNC), pp. 1\u20136, 2021.","DOI":"10.1109\/CCNC49032.2021.9369513"},{"key":"9781_CR36","doi-asserted-by":"publisher","first-page":"107784","DOI":"10.1016\/j.compeleceng.2022.107784","volume":"99","author":"J Whelan","year":"2022","unstructured":"Whelan, J., Almehmadi, A., El-Khatib, K.: Artificial intelligence for intrusion detection systems in unmanned aerial vehicles. Comput. Electr. Eng. 99, 107784 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"9781_CR37","doi-asserted-by":"crossref","unstructured":"B. Fraser, S. Al-Rubaye, S. Aslam, and A. Tsourdos, \u201cEnhancing the Security of Unmanned Aerial Systems using Digital-twin Technology and Intrusion Detection,\u201d Proc. of IEEE\/AIAA 40th Digital Avionics Systems Conference, (DASC), pp. 1\u201310, IEEE, 2021.","DOI":"10.1109\/DASC52595.2021.9594321"},{"key":"9781_CR38","doi-asserted-by":"publisher","first-page":"105650","DOI":"10.1016\/j.asoc.2019.105650","volume":"83","author":"S Khan","year":"2019","unstructured":"Khan, S., Liew, C.F., Yairi, T., McWilliam, R.: Unsupervised Anomaly detection in unmanned aerial vehicles. Appl. Soft Comput. J. 83, 105650 (2019)","journal-title":"Appl. Soft Comput. J."},{"key":"9781_CR39","doi-asserted-by":"crossref","unstructured":"A. Taylor, N. Japkowicz, and S. Leblanc, \u201cFrequency-based Anomaly Detection for the Automotive CAN Bus,\u201d Proc. of IEEE World Congr. Ind. Control Sys. Secur., pp. 45\u201349, 2015.","DOI":"10.1109\/WCICSS.2015.7420322"},{"issue":"7","key":"9781_CR40","doi-asserted-by":"publisher","first-page":"119","DOI":"10.3390\/fi12070119","volume":"12","author":"VS Barletta","year":"2020","unstructured":"Barletta, V.S., Caivano, D., Nannavecchia, A., Scalera, M.: Intrusion detection for in-vehicle communication networks: an unsupervised kohonen som approach. Future Intern 12(7), 119 (2020)","journal-title":"Future Intern"},{"key":"9781_CR41","first-page":"100198","volume":"21","author":"HM Song","year":"2020","unstructured":"Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Elsevier Veh. Commun. J. 21, 100198 (2020)","journal-title":"Elsevier Veh. Commun. J."},{"key":"9781_CR42","doi-asserted-by":"crossref","unstructured":"M. P. Arthur, \u201cDetecting Signal Spoofing and Jamming Attacks in UAV Networks using a Lightweight IDS,\u201d Proc. of Int. conf. on computer, information, and telecommunication systems, (CITS), pp. 1\u20135, IEEE, 2019.","DOI":"10.1109\/CITS.2019.8862148"},{"key":"9781_CR43","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.eswa.2015.12.006","volume":"50","author":"OA Wahab","year":"2016","unstructured":"Wahab, O.A., Mourad, A., Otrok, H., Bentahar, J.: CEAP: SVM-based intelligent detection model for clustered vehicular Ad Hoc networks. Expert Syst. Appl. 50, 40\u201354 (2016)","journal-title":"Expert Syst. Appl."},{"key":"9781_CR44","doi-asserted-by":"crossref","unstructured":"A. Ferdowsi, U. Challita, W. Saad, and N. B. Mandayam, \u201cRobust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems,\u201d Proc. of 21st Int. Conf. on Intelligent Transportation Systems, (ITSC), pp. 307\u2013312, 2018.","DOI":"10.1109\/ITSC.2018.8569635"},{"key":"9781_CR45","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/ACCESS.2017.2782159","volume":"6","author":"G Loukas","year":"2018","unstructured":"Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491\u20133508 (2018)","journal-title":"IEEE Access"},{"key":"9781_CR46","doi-asserted-by":"crossref","unstructured":"S. Tariq, S. Lee, and S. S. Woo, \u201cCANTransfer: Transfer learning-based Intrusion Detection on a Controller Area Network using Convolutional LSTM Network,\u201d Proc. of 35th Annu. ACM Symp. Appl. Comput., pp. 1048\u20131055, 2020.","DOI":"10.1145\/3341105.3373868"},{"issue":"2","key":"9781_CR47","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","volume":"8","author":"A Javed","year":"2021","unstructured":"Javed, A., Rehman, S., Khan, M., Alazab, M., Reddy, T.: CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 8(2), 1456\u20131466 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"9781_CR48","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/ACCESS.2021.3136706","volume":"10","author":"S Ercan","year":"2021","unstructured":"Ercan, S., Ayaida, M., Messai, N.: Misbehavior Detection for position falsification attacks in VANETs using machine learning. IEEE Access 10, 1893\u20131904 (2021)","journal-title":"IEEE Access"},{"issue":"2","key":"9781_CR49","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TVT.2021.3051026","volume":"70","author":"HM Song","year":"2021","unstructured":"Song, H.M., Kim, H.K.: Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans. Veh. Technol. 70(2), 1098\u20131108 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"9781_CR50","first-page":"1311","volume":"8","author":"Q He","year":"2020","unstructured":"He, Q., Meng, X., Qu, R., Xi, R.: Machine Learning-based detection for cyber security attacks on connected and autonomous vehicles. Proc. of Math. 8(8), 1311 (2020)","journal-title":"Proc. of Math."},{"key":"9781_CR52","doi-asserted-by":"crossref","unstructured":"M. A. Elsayed and N. Zincir-Heywood, \u201cBoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks,\u201d Proc. of the 18th IEEE\/IFIP Network Operations and Management Symposium, (NOMS), 25\u201329 April 2022.","DOI":"10.1109\/NOMS54207.2022.9789771"},{"key":"9781_CR3","doi-asserted-by":"publisher","first-page":"102269","DOI":"10.1016\/j.cose.2021.102269","volume":"109","author":"M Pham","year":"2021","unstructured":"Pham, M., Xiong, K.: A survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles. J. Comput. Secur, Elsevier 109, 102269 (2021)","journal-title":"J. Comput. Secur, Elsevier"},{"key":"9781_CR4","doi-asserted-by":"publisher","first-page":"9180","DOI":"10.1109\/ACCESS.2021.3050038","volume":"9","author":"A Lamssaggad","year":"2021","unstructured":"Lamssaggad, A., Benamar, N., Hafid, A.S., Msahli, M.: A survey on the Current security landscape of intelligent transportation systems. IEEE Access 9, 9180\u20139208 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"9781_CR5","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/TIV.2020.2987430","volume":"5","author":"M Hasan","year":"2020","unstructured":"Hasan, M., Mohan, S., Shimizu, T., Lu, H.: Securing vehicle-to-everything (V2X) communication platforms. IEEE Trans. Intell. Veh 5(4), 693\u2013713 (2020)","journal-title":"IEEE Trans. Intell. Veh"},{"issue":"1","key":"9781_CR6","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","volume":"21","author":"RW van der Heijden","year":"2018","unstructured":"van der Heijden, R.W., Dietzel, S., Leinm\u00fcller, T., Kargl, F.: Survey on Misbehavior detection in cooperative intelligent transportation systems. Proc. IEEE Commun. Surv. Tutor. 21(1), 779\u2013811 (2018)","journal-title":"Proc. IEEE Commun. Surv. Tutor."},{"key":"9781_CR7","unstructured":"Dedicated Short Range Communications (DSRC) Message set Dictionary\u2122, IEEE SAE J2735, SAE International, 2016."},{"key":"9781_CR8","unstructured":"ETSI EN 302 637\u20132 V1.4.1: Intelligent Transport Systems (ITS): Vehicular Communications, Basic Set of Applications, Part 2: Specification of Cooperative Awareness Basic Service,\u201d ETSI WG5 Technical Specification, pp. 1\u201345, January 2019."},{"key":"9781_CR9","doi-asserted-by":"crossref","unstructured":"O. Pu\u00f1al, A. Aguiar, and J. Gross, \u201cIn VANETs we trust? Characterizing RF Jamming in Vehicular Networks,\u201d Proc. of 9th ACM Int. Workshop Veh. Inter Netw. Syst. Appl., (VANET), pp. 83\u201392, 2012.","DOI":"10.1145\/2307888.2307903"},{"key":"9781_CR10","doi-asserted-by":"crossref","unstructured":"J. Petit, M. Feiri, and F. Kargl, \u201cSpoofed Data Detection in VANETs using Dynamic Thresholds,\u201d Proc. of Veh. Netw. Conf., pp. 25\u201332, 2011.","DOI":"10.1109\/VNC.2011.6117120"},{"key":"9781_CR11","doi-asserted-by":"crossref","unstructured":"U. E. Larson, D. K. Nilsson, and E. Jonsson, \u201cAn Approach to Specification-based Attack Detection for in-vehicle Networks,\u201d Proc. of Intelligent Vehicles Symposium, pp. 220\u2013225, IEEE, 2008.","DOI":"10.1109\/IVS.2008.4621263"},{"key":"9781_CR12","first-page":"260","volume":"21","author":"C Miller","year":"2013","unstructured":"Miller, C., Valasek, C.: Adventures in Automotive Networks and Control Units. Proc. DEF CON 21, 260\u2013264 (2013)","journal-title":"Proc. DEF CON"},{"key":"9781_CR13","doi-asserted-by":"crossref","unstructured":"M. R. Moore, R. A. Bridges, F. L. Combs, M. S. Starr, and S. J. Prowell, \u201cModeling Inter-signal Arrival Times for Accurate Detection of CAN Bus Signal Injection Attacks: A Data-driven Approach to in-vehicle Intrusion Detection,\u201d Proc. of 12th Annual Conference on Cyber and Information Security Research, pp. 1\u20134, 2017.","DOI":"10.1145\/3064814.3064816"},{"issue":"8","key":"9781_CR14","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","volume":"13","author":"W Choi","year":"2018","unstructured":"Choi, W., Joo, K., Jo, H.J., Park, M.C., Lee, D.H.: VoltageIDS: Low level communication characteristics for automotive intrusion detection system. IEEE Trans. Inf. Forensics Secur. 13(8), 2114\u20132129 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9781_CR15","first-page":"1110","volume-title":"Entropy-based Anomaly Detection for in-vehicle Networks","author":"M M\u00fcter","year":"2011","unstructured":"M\u00fcter, M., Asaj, N.: Entropy-based Anomaly Detection for in-vehicle Networks, pp. 1110\u20131115. Proc. of Intelligent Vehicles Symposium, IEEE (2011)"},{"key":"9781_CR16","doi-asserted-by":"crossref","unstructured":"M. Marchetti, D. Stabili, A. Guido, and M. Colajanni, \u201cEvaluation of Anomaly Detection for in-vehicle Networks through Information-Theoretic Algorithms,\u201d Proc. of IEEE 2nd Int. Forum Res. Technol. Soc. Ind. Leveraging Better Tomorrow, pp. 1\u20136, Sep. 2016.","DOI":"10.1109\/RTSI.2016.7740627"},{"key":"9781_CR17","doi-asserted-by":"crossref","unstructured":"H. M. Song, H. R. Kim, and H. K. Kim, \u201cIntrusion Detection System based on the Analysis of Time Intervals of CAN Messages for in-vehicle Network,\u201d Proc. of IEEE Int. Conf. Inf. Net., pp. 63\u201368, 2016.","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"9781_CR18","doi-asserted-by":"crossref","unstructured":"C. Young, H. Olufowobi, G. Bloom, and J. Zambreno, \u201cAutomotive Intrusion Detection based on Constant CAN Message Frequencies across Vehicle Driving Modes,\u201d Proc. of ACM Workshop Automot. Cybersec., pp. 9\u201314, 2019.","DOI":"10.1145\/3309171.3309179"},{"issue":"2","key":"9781_CR19","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/TVT.2019.2961344","volume":"69","author":"H Olufowobi","year":"2019","unstructured":"Olufowobi, H., Young, C., Zambreno, J., Bloom, G.: Saiducant: specification-based automotive intrusion detection using controller area network (CAN) timing. IEEE Trans. Veh. Technol. 69(2), 1484\u20131494 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9781_CR20","unstructured":"K. G. Shin and K. T. Cho, \u201cFingerprinting Electronic Control Units for Vehicle Intrusion Detection,\u201d U.S. Patent 11,044,260 B2, University of Michigan, June 22, 2021."},{"key":"9781_CR21","doi-asserted-by":"crossref","unstructured":"M. Sun, M. Li, and R. Gerdes, \u201cA Data Trust Framework for VANETs Enabling False Data Detection and Secure Vehicle Tracking,\u201d Proc. of IEEE Conference on Communications and Network Security, (CNS), IEEE, pp. 1\u20139, 2017.","DOI":"10.1109\/CNS.2017.8228654"},{"key":"9781_CR22","doi-asserted-by":"crossref","unstructured":"C. Sowattana, W. Viriyasitavat, and A. Khurat, \u201cDistributed Consensus-based Sybil Nodes Detection in VANETs,\u201d Proc. of 14th Int. Joint Conf. Comput. Sci. Softw. Eng., (JCSSE), pp. 1\u20136, 2017.","DOI":"10.1109\/JCSSE.2017.8025908"},{"issue":"2","key":"9781_CR23","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TMC.2018.2833849","volume":"18","author":"Y Yao","year":"2018","unstructured":"Yao, Y., Xiao, B., Wu, G., Liu, X., Yu, Z., Zhang, K., Zhou, X.: Multi-channel-based Sybil Attack detection in vehicular ad hoc networks using RSSI. Trans. Mob. Comput. 18(2), 362\u2013375 (2018)","journal-title":"Trans. Mob. Comput."},{"key":"9781_CR24","doi-asserted-by":"crossref","unstructured":"S. So, J. Petit, and D. Starobinski, \u201cPhysical Layer Plausibility Checks for Misbehavior Detection in V2X Networks,\u201d Proc. of the 12th Conf. on Security and Privacy in Wireless and Mobile Networks, pp. 84\u201393, 2019.","DOI":"10.1145\/3317549.3323406"},{"key":"9781_CR25","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TSMC.2013.2265083","volume":"44","author":"R Mitchell","year":"2013","unstructured":"Mitchell, R., Chen, R.: Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans. Syst. Man Cybern. Syst. 44, 593\u2013604 (2013)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"9781_CR26","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/TSMC.2017.2681698","volume":"48","author":"H Sedjelmaci","year":"2017","unstructured":"Sedjelmaci, H., Senouci, S.M., Ansari, N.A.: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans. Syst. Man Cybern. Syst. 48, 1594\u20131606 (2017)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"9781_CR27","doi-asserted-by":"crossref","unstructured":"J. Sun, W. Wang, Q. Da, L. Kou, G. Zhao, L. Zhang, and Q. Han, \u201cAn Intrusion Detection Based on Bayesian Game Theory for UAV Network,\u201d Proc. of 11th EAI International Conference on Mobile Multimedia Communications, European Alliance for Innovation, (EAI), p. 56, 2018.","DOI":"10.4108\/eai.21-6-2018.2277054"},{"key":"9781_CR28","doi-asserted-by":"crossref","unstructured":"D. Wang and D. Feng, \u201cResearch on the Strategy of Drones Intrusion Detection based on Game Theory,\u201d Proc. of IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, (IEMCON), IEEE, pp. 613\u2013619, 2018.","DOI":"10.1109\/IEMCON.2018.8615037"},{"key":"9781_CR64","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3198507","author":"T Zhang","year":"2022","unstructured":"Zhang, T., Xu, C., Zhang, B., Shen, J., Kuang, X., Grieco, L.A.: Toward attack-resistant route mutation for VANETs: an online and adaptive multiagent reinforcement learning approach. IEEE Trans. Intell. Transp. Syst. (2022). https:\/\/doi.org\/10.1109\/TITS.2022.3198507","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"12","key":"9781_CR51","doi-asserted-by":"publisher","first-page":"25469","DOI":"10.1109\/TITS.2021.3105834","volume":"23","author":"IA Khan","year":"2021","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Haider, W., Li, B., Jolfaei, A.: An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Trans. Intell. Transp. Syst. 23(12), 25469\u201325478 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"4","key":"9781_CR66","doi-asserted-by":"publisher","first-page":"4312","DOI":"10.1109\/TVT.2020.2973705","volume":"69","author":"Y Dai","year":"2020","unstructured":"Dai, Y., Xu, D., Zhang, K., Maharjan, S., Zhang, Y.: Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks. IEEE Trans. Veh. Technol. 69(4), 4312\u20134324 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9781_CR67","first-page":"100398","volume":"33","author":"A Mekrache","year":"2022","unstructured":"Mekrache, A., Bradai, A., Moulay, E., Dawaliby, S.: Deep reinforcement learning techniques for vehicular networks: recent advances and future trends towards 6G. Veh. Commun. 33, 100398 (2022)","journal-title":"Veh. Commun."},{"issue":"1","key":"9781_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3485129","volume":"55","author":"R Meneguette","year":"2021","unstructured":"Meneguette, R., De Grande, R., Ueyama, J., Filho, G.P.R., Madeira, E.: Vehicular edge computing: architecture, resource management, security, and challenges. ACM Comput. Surv. (CSUR) 55(1), 1\u201346 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"9781_CR69","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/IOTM.001.2200140","volume":"6","author":"A Boualouache","year":"2023","unstructured":"Boualouache, A., Brik, B., Tang, Q., Korba, A.A., Cherrier, S., Senouci, S.M., Pardo, E., Ghamri-Doudane, Y., Langar, R., Engel, T.: 5G vehicle-to-everything at the cross-borders: security challenges and opportunities. IEEE Intern. Things Mag 6(1), 114\u2013119 (2023)","journal-title":"IEEE Intern. Things Mag"},{"key":"9781_CR53","doi-asserted-by":"crossref","unstructured":"R. W. van der Heijden, T. Lukaseder, and F. Kargl, \u201cVeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs,\u201d arXiv preprint, arXiv:1804.06701, 2018.","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"9781_CR54","doi-asserted-by":"crossref","unstructured":"J. Montiel, R. Rory Mitchell, E. Frank, B. Pfahringer, T. Abdessalem, and A. Bifet. \u201cAdaptive XGBoost for Evolving Data Streams,\u201d Proc. of 2020 International Joint Conference on Neural Networks, (IJCNN), pp. 1\u20138, IEEE, 2020.","DOI":"10.1109\/IJCNN48605.2020.9207555"},{"key":"9781_CR55","doi-asserted-by":"crossref","unstructured":"T. Chen, and C. Guestrin, \u201cXGBoost: A Scalable Tree Boosting System,\u201d Proc. of the 22nd ACM Int. Conf. on Knowledge Discovery and Data Mining, pp. 785\u2013794. 2016.","DOI":"10.1145\/2939672.2939785"},{"issue":"28","key":"9781_CR56","first-page":"307","volume":"2","author":"LS Shapley","year":"1953","unstructured":"Shapley, L.S.: A value for n-person games. Contrib. Theory Games 2(28), 307\u2013317 (1953)","journal-title":"Contrib. Theory Games"},{"key":"9781_CR57","unstructured":"M. Lundberg and S. I. Lee, \u201cA Unified Approach to Interpreting Model Predictions,\u201d Proc. of 31st Conference on Advances in Neural Information Processing Systems, 2017."},{"key":"9781_CR58","unstructured":"E. Strumbelj and I. Kononenko, \u201cAn Efficient Explanation of Individual Classifications using Game Theory,\u201d Proc. of Journal of Machine Learning Research, pp. 1\u201318, 2010."},{"key":"9781_CR59","unstructured":"S. M. Lundberg, G. G. Erion, and S. I. Lee, \u201cConsistent Individualized Feature Attribution for Tree Ensembles,\u201d Proc. of the 2017 ICML Workshop on Human Interpretability in Machine Learning, (WHI 2017), Sydney, Australia, pp. 15\u201321, August 2017."},{"key":"9781_CR60","doi-asserted-by":"crossref","unstructured":"J. Kamel, M. Wolf, R. W. van der Hei, A. Kaiser, P. Urien, and F. Kargl, \u201cVeReMi extension: A dataset for comparable evaluation of misbehavior detection in VANETs,\u201d Proc. of IEEE Int. Conf. on Communications, (ICC), pp. 1\u20136, IEEE, 2020.","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"9781_CR65","doi-asserted-by":"publisher","unstructured":"J. Whelan, T. Sangarapillai, O. Minawi, A. Almehmadi, K. El-Khatib, \"UAV Attack Dataset\", IEEE Dataport, February 26, 2020. doi: https:\/\/doi.org\/10.21227\/00dg-0d12.","DOI":"10.21227\/00dg-0d12"},{"issue":"3","key":"9781_CR61","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10994-012-5320-9","volume":"90","author":"J Gama","year":"2013","unstructured":"Gama, J., Sebastiao, R., Rodrigues, P.P.: On evaluating stream learning algorithms. Mach. Learn. 90(3), 317\u2013346 (2013)","journal-title":"Mach. Learn."},{"key":"9781_CR62","unstructured":"J. Haug, E. Tramountani, and G. Kasneci, \u201cStandardized Evaluation of Machine Learning Methods for Evolving Data Streams,\u201d arXiv preprint, arXiv:2204.13625, 2022."},{"key":"9781_CR63","doi-asserted-by":"crossref","unstructured":"A. Bifet, G. de Francisci Morales, J. Read, G. Holmes, and B. Pfahringer, \u201cEfficient online evaluation of big data stream classifiers,\u201d Proc. of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 59\u201368, 2015.","DOI":"10.1145\/2783258.2783372"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09781-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09781-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09781-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T04:36:07Z","timestamp":1706330167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09781-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":69,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["9781"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09781-w","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2023,11,1]]},"assertion":[{"value":"13 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"6"}}