{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:22:03Z","timestamp":1772065323365,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11227-019-03088-x","type":"journal-article","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T19:02:48Z","timestamp":1574794968000},"page":"5948-5970","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks"],"prefix":"10.1007","volume":"76","author":[{"given":"Raenu","family":"Kolandaisamy","sequence":"first","affiliation":[]},{"given":"Rafidah Md.","family":"Noor","sequence":"additional","affiliation":[]},{"given":"Muhammad Reza","family":"Z\u2019aba","sequence":"additional","affiliation":[]},{"given":"Ismail","family":"Ahmedy","sequence":"additional","affiliation":[]},{"given":"Indraah","family":"Kolandaisamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,26]]},"reference":[{"key":"3088_CR1","doi-asserted-by":"crossref","unstructured":"Branitskiy A (2015) Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers, vol 18. IEEE","DOI":"10.1109\/CSE.2015.26"},{"issue":"2","key":"3088_CR2","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/JSAC.2012.120224","volume":"30","author":"A Le","year":"2012","unstructured":"Le A, Markopoulou A (2012) Cooperative defense against pollution attacks in network coding using spacemac. IEEE J Sel Areas Commun 30(2):442\u2013449","journal-title":"IEEE J Sel Areas Commun"},{"key":"3088_CR3","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.adhoc.2013.08.017","volume":"13","author":"A Nadeem","year":"2014","unstructured":"Nadeem A, Howarth MP (2014) An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw 13:368\u2013380","journal-title":"Ad Hoc Netw"},{"key":"3088_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1075648","author":"\u00d6 Cepheli","year":"2016","unstructured":"Cepheli \u00d6, B\u00fcy\u00fck\u00e7orak S, Karabulut Kurt G (2016) Hybrid intrusion detection system for DDoS attacks. J Electr Comput Eng. https:\/\/doi.org\/10.1155\/2016\/1075648","journal-title":"J Electr Comput Eng"},{"key":"3088_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2016.08.014","volume":"53","author":"CJ Fung","year":"2016","unstructured":"Fung CJ, Zhu Q (2016) FACID: a trust-based collaborative decision framework for intrusion detection networks. Ad Hoc Netw 53:17\u201331","journal-title":"Ad Hoc Netw"},{"key":"3088_CR6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2874509","author":"R Kolandaisamy","year":"2018","unstructured":"Kolandaisamy R, Md Noor R, Ahmedy I, Ahmad I, Reza Z\u2019aba M, Imran M, Alnuem M (2018) A multivariant stream analysis approach to detect and mitigate DDoS attacks in vehicular ad hoc networks. Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2018\/2874509","journal-title":"Wirel Commun Mob Comput"},{"key":"3088_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25243-3_10","volume-title":"Preserving security and privacy in large-scale VANETs","author":"B Qin","year":"2011","unstructured":"Qin B, Wu Q (2011) Preserving security and privacy in large-scale VANETs. Springer, Berlin"},{"issue":"2","key":"3088_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/TNET.2011.2106162","volume":"19","author":"C Zhang","year":"2011","unstructured":"Zhang C, Song Y, Fang Y, Zhang Y (2011) On the price of security in large-scale wireless ad hoc networks. IEEE\/ACM Trans Netw 19(2):319\u2013332","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"10","key":"3088_CR9","first-page":"4373","volume":"4","author":"A Sinha","year":"2013","unstructured":"Sinha A, Mishra SK (2013) Preventing VANET from DoS & DDoS attack. Int J Eng Trends Technol (IJETT) 4(10):4373\u20134376","journal-title":"Int J Eng Trends Technol (IJETT)"},{"key":"3088_CR10","doi-asserted-by":"crossref","unstructured":"de Biasi G, Vieira LF, Loureiro AA (2018) Sentinel: defense mechanism against DDoS flooding attack in software defined vehicular network. In: 2018 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2018.8422303"},{"issue":"4","key":"3088_CR11","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/TMC.2010.191","volume":"10","author":"D Niyato","year":"2011","unstructured":"Niyato D, Hossain E, Wang P (2011) Optimal channel access management with QoS support for cognitive vehicular networks. IEEE Trans Mob Comput 10(4):573\u2013591","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"3088_CR12","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TMC.2011.274","volume":"12","author":"EY Vasserman","year":"2011","unstructured":"Vasserman EY, Hopper N (2011) Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans Mob Comput 12(2):318\u2013332","journal-title":"IEEE Trans Mob Comput"},{"key":"3088_CR13","unstructured":"Karimazad R, Faraahi A (2011) An anomaly-based method for DDoS attacks detection using RBF neural networks. In: Proceedings of the International Conference on Network and Electronics Engineering"},{"issue":"3","key":"3088_CR14","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TDSC.2010.11","volume":"8","author":"G Xu","year":"2010","unstructured":"Xu G, Borcea C, Iftode L (2010) A policy enforcing mechanism for trusted ad hoc networks. IEEE Trans Dependable Secure Comput 8(3):321\u2013336","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"10","key":"3088_CR15","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1109\/TMC.2011.189","volume":"11","author":"J Jeong","year":"2011","unstructured":"Jeong J, Guo S, Gu Y, He T, Du DH (2011) Trajectory-based statistical forwarding for multihop infrastructure-to-vehicle data delivery. IEEE Trans Mob Comput 11(10):1523\u20131537","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"3088_CR16","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/TVT.2012.2226613","volume":"62","author":"Khaleel Mershad","year":"2013","unstructured":"Mershad Khaleel, Artail Hassan (2013) A framework for secure and efficient data acquisition in vehicular ad hoc networks. IEEE Trans Veh Technol 62(2):536\u2013543","journal-title":"IEEE Trans Veh Technol"},{"key":"3088_CR17","doi-asserted-by":"crossref","unstructured":"Kumar A, Sinha M (2014) Overview on vehicular ad hoc network and its security issues. In: 2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, pp 792\u2013797","DOI":"10.1109\/IndiaCom.2014.6828071"},{"issue":"2","key":"3088_CR18","first-page":"119","volume":"15","author":"NCS Iyengar","year":"2015","unstructured":"Iyengar NCS, Ganapathy G (2015) Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment. Cybern Inf Technol 15(2):119\u2013140","journal-title":"Cybern Inf Technol"},{"key":"3088_CR19","doi-asserted-by":"crossref","unstructured":"RoselinMary S, Maheshwari M, Thamaraiselvan M (2013) Early detection of DOS attacks in VANET using Attacked packet detection algorithm (APDA). In: 2013 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, pp 237\u2013240","DOI":"10.1109\/ICICES.2013.6508250"},{"key":"3088_CR20","doi-asserted-by":"crossref","unstructured":"Singh A, Sharma P (2015) A novel mechanism for detecting DoS attack in VANET using enhanced attacked packet detection algorithm (EAPDA). In: 2015 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS). IEEE, pp 1\u20135","DOI":"10.1109\/RAECS.2015.7453358"},{"issue":"4","key":"3088_CR21","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1109\/JSYST.2016.2602848","volume":"11","author":"K Kalkan","year":"2016","unstructured":"Kalkan K, G\u00fcr G, Alag\u00f6z F (2016) Filtering-based defense mechanisms against DDoS attacks: a survey. IEEE Syst J 11(4):2761\u20132773","journal-title":"IEEE Syst J"},{"key":"3088_CR22","doi-asserted-by":"crossref","unstructured":"Furfaro A, Malena G, Molina L, Parise A (2015) A simulation model for the analysis of DDOS amplification attacks. In: 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim). IEEE, pp 267\u2013272","DOI":"10.1109\/UKSim.2015.52"},{"key":"3088_CR23","doi-asserted-by":"crossref","unstructured":"Benatia MA, Khoukhi L, Esseghir M, Boulahia LM (2013) A Markov chain based model for congestion control in VANETs. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops. IEEE, pp 1021\u20131026","DOI":"10.1109\/WAINA.2013.60"},{"issue":"2","key":"3088_CR24","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TNET.2009.2026748","volume":"18","author":"G Shrimali","year":"2009","unstructured":"Shrimali G, Akella A, Mutapcic A (2009) Cooperative interdomain traffic engineering using nash bargaining and decomposition. IEEE\/ACM Trans Netw 18(2):341\u2013352","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"3088_CR25","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TWC.2010.102810.091749","volume":"10","author":"H Yu","year":"2010","unstructured":"Yu H, Zhang S, Lau VK (2010) Game theoretical power control for open-loop overlaid network MIMO systems with partial cooperation. IEEE Trans Wirel Commun 10(1):135\u2013141","journal-title":"IEEE Trans Wirel Commun"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-03088-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-019-03088-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-03088-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T01:25:29Z","timestamp":1606267529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-019-03088-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,26]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["3088"],"URL":"https:\/\/doi.org\/10.1007\/s11227-019-03088-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,26]]},"assertion":[{"value":"26 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}