{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:47:09Z","timestamp":1773924429999,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T00:00:00Z","timestamp":1593993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T00:00:00Z","timestamp":1593993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07635-1","type":"journal-article","created":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T05:21:42Z","timestamp":1594012902000},"page":"1415-1444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3077-6929","authenticated-orcid":false,"given":"Rabah","family":"Rahal","sequence":"first","affiliation":[]},{"given":"Abdelaziz","family":"Amara Korba","sequence":"additional","affiliation":[]},{"given":"Nacira","family":"Ghoualmi-Zine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,6]]},"reference":[{"key":"7635_CR1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.jnca.2015.08.020","volume":"58","author":"OMH Rehman","year":"2015","unstructured":"Rehman, O. M. H., Bourdoucen, H., & Ould-Khaoua, M. (2015). Forward link quality estimation in VANETs for sender-oriented alert messages broadcast. Journal of Network and Computer Applications, 58, 23\u201341.","journal-title":"Journal of Network and Computer Applications"},{"key":"7635_CR2","doi-asserted-by":"crossref","unstructured":"Mihaita, A.-E., Dobre, C., Pop, F., Mavromoustakis, C. X., & Mastorakis, G. (2016). Secure opportunistic vehicle-to-vehicle communication. In C. X. Mavromoustakis, G. Mastorakis, C. Dobre (Eds.), Studies in big data (pp. 229\u2013268). Springer.","DOI":"10.1007\/978-3-319-45145-9_10"},{"issue":"2","key":"7635_CR3","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1504\/IJVS.2014.060160","volume":"7","author":"D Bektache","year":"2014","unstructured":"Bektache, D., Tolba, C., & Zine, N. G. (2014). Forecasting approach in VANET based on vehicle kinematics for road safety. International Journal of Vehicle Safety, 7(2), 147.","journal-title":"International Journal of Vehicle Safety"},{"issue":"3","key":"7635_CR4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.9790\/0661-0332838","volume":"3","author":"MY Gadkari","year":"2012","unstructured":"Gadkari, M. Y., & Sambre, N. B. (2012). VANET: Routing protocols, security issues and simulation tools. IOSR Journal of Computer Engineering, 3(3), 28\u201338.","journal-title":"IOSR Journal of Computer Engineering"},{"issue":"1","key":"7635_CR5","doi-asserted-by":"crossref","first-page":"29","DOI":"10.4018\/IJISP.2018010103","volume":"12","author":"A Malik","year":"2018","unstructured":"Malik, A., & Pandey, B. (2018). CIAS: A comprehensive identity authentication scheme for providing security in VANET. International Journal of Information Security and Privacy (IJISP), 12(1), 29\u201341.","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"7635_CR6","doi-asserted-by":"crossref","unstructured":"Belenko, V., Krundyshev, V., & Kalinin, M. (2018). Synthetic datasets generation for intrusion detection in VANET. In Proceedings of the 11th international conference on security of information and networks (p. 9). ACM.","DOI":"10.1145\/3264437.3264479"},{"key":"7635_CR7","doi-asserted-by":"crossref","unstructured":"Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. D. (2015). On the detection of grey hole and rushing attacks in self-driving vehicular networks. In 2015 7th Computer science and electronic engineering conference (CEEC) (pp. 231\u2013236). IEEE.","DOI":"10.1109\/CEEC.2015.7332730"},{"key":"7635_CR8","doi-asserted-by":"crossref","unstructured":"Grover, J., Prajapati, N. K., Laxmi, V., & Gaur, M. S. (2011). Machine learning approach for multiple misbehavior detection in VANET. In International conference on advances in computing and communications (pp. 644\u2013653). Berlin: Springer.","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"7635_CR9","doi-asserted-by":"crossref","unstructured":"Singh, P. K., Gupta, R. R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect wormhole attack in VANETs. In Workshops of the international conference on advanced information networking and applications (pp. 651\u2013661). Cham: Springer.","DOI":"10.1007\/978-3-030-15035-8_63"},{"key":"7635_CR10","doi-asserted-by":"crossref","unstructured":"Singh, P. K., Gupta, S., Vashistha, R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect position falsification attack in VANETs. In International conference on security and privacy (pp. 166\u2013178). Singapore: Springer.","DOI":"10.1007\/978-981-13-7561-3_13"},{"key":"7635_CR11","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.vehcom.2017.01.002","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7\u201320.","journal-title":"Vehicular Communications"},{"key":"7635_CR12","doi-asserted-by":"crossref","unstructured":"Quyoom, A., Ali, R., Gouttam, D. N., & Sharma, H. (2015). A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA). In International conference on computing, communication and automation (pp. 414\u2013419). IEEE.","DOI":"10.1109\/CCAA.2015.7148411"},{"key":"7635_CR13","doi-asserted-by":"crossref","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842.","journal-title":"Ad Hoc Networks"},{"key":"7635_CR14","first-page":"109","volume-title":"Advanced multimedia and ubiquitous engineering","author":"A Anzer","year":"2018","unstructured":"Anzer, A., & Elhadef, M. (2018). Deep learning-based intrusion detection systems for intelligent vehicular ad hoc networks. In J. J. Park, V. Loia, K.-K. R. Choo, & G. Yi (Eds.), Advanced multimedia and ubiquitous engineering (pp. 109\u2013116). Singapore: Springer."},{"key":"7635_CR15","doi-asserted-by":"crossref","unstructured":"Gyawali, S., & Qian, Y. (2019). Misbehavior detection using machine learning in vehicular communication networks. In ICC 2019\u20132019 IEEE international conference on communications (ICC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2019.8761300"},{"key":"7635_CR16","doi-asserted-by":"crossref","unstructured":"Krundyshev, V., Kalinin, M., & Zegzhda, P. (2018). Artificial swarm algorithm for VANET protection against routing attacks. In 2018 IEEE industrial cyber-physical systems (ICPS) (pp. 795\u2013800). IEEE.","DOI":"10.1109\/ICPHYS.2018.8390808"},{"key":"7635_CR17","doi-asserted-by":"crossref","unstructured":"Kumar, S., & Mann, K. S. (2018). Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs. In 2018 4th International conference on computing sciences (ICCS) (pp. 72\u201379). IEEE.","DOI":"10.1109\/ICCS.2018.00018"},{"issue":"3","key":"7635_CR18","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1109\/LCOMM.2019.2894767","volume":"23","author":"N Lyamin","year":"2019","unstructured":"Lyamin, N., Kleyko, D., Delooz, Q., & Vinel, A. (2019). Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining. IEEE Communications Letters, 23(3), 442\u2013445.","journal-title":"IEEE Communications Letters"},{"key":"7635_CR19","doi-asserted-by":"crossref","unstructured":"Schmidt, D. A., Khan, M. S., & Bennett, B. T. (2019). Spline based intrusion detection in vehicular ad hoc networks (VANET). arXiv preprint arXiv:1903.08018.","DOI":"10.1109\/SoutheastCon42311.2019.9020367"},{"key":"7635_CR20","doi-asserted-by":"crossref","unstructured":"Tomandl, A., Fuchs, K. P., & Federrath, H. (2014). REST-Net: A dynamic rule-based IDS for VANETs. In 2014 7th IFIP wireless and mobile networking conference (WMNC) (pp. 1\u20138). IEEE.","DOI":"10.1109\/WMNC.2014.6878854"},{"key":"7635_CR21","unstructured":"Kdd.ics.uci.edu. (1999). KDD cup 1999 data. Retrieved August 15, 2019, from http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"7635_CR22","unstructured":"Analysis, C. (2019). Data collection, curation and sharing. [online] CAIDA. Retrieved August 15. 2019, from https:\/\/www.caida.org\/data\/."},{"key":"7635_CR23","unstructured":"Unb.ca. (2019). NSL-KDD | Datasets | Research | Canadian Institute for Cybersecurity | UNB. Retrieved August 15, 2019, from https:\/\/www.unb.ca\/cic\/datasets\/nsl.html."},{"key":"7635_CR24","unstructured":"Iscx.ca. (2019). Datasets\u2014ISCX. Retrieved August 15, 2019, from http:\/\/www.iscx.ca\/datasets\/."},{"key":"7635_CR25","unstructured":"Cicids.ca. (2019). IDS 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. Retrieved August 15, 2019, from https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html."},{"key":"7635_CR26","unstructured":"Unsw.adfa.edu.au. (2019). The UNSW-NB15 data set description. Retrieved August 15, 2019, from https:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/."},{"key":"7635_CR27","unstructured":"ns-3. (2019). ns-3. Retrieved August 15, 2019, from https:\/\/www.nsnam.org\/."},{"key":"7635_CR28","unstructured":"Nsl.cs.nctu.edu.tw. (2019). EstiNet Network Simulator and Emulator (NCTUns). Retrieved August 15, 2019, from http:\/\/nsl.cs.nctu.edu.tw\/NSL\/nctuns.html."},{"key":"7635_CR29","unstructured":"Nagle, D. (2019). Packet sender\u2014Free utility to for sending\/receiving of network packets. TCP, UDP, SSL. [online] Packetsender.com. Retrieved August 15, 2019, from https:\/\/packetsender.com\/."},{"key":"7635_CR30","unstructured":"Wireshark.org. (2019). Wireshark \u00b7 Go Deep. Retrieved August 15, 2019, from https:\/\/www.wireshark.org\/."},{"key":"7635_CR31","unstructured":"Netflowmeter.ca. (2019). NetFlowMeter. Retrieved August 15, 2019, from http:\/\/netflowmeter.ca\/."},{"key":"7635_CR32","doi-asserted-by":"crossref","unstructured":"Lashkari, A. H., Kadir, A. F. A., Gonzalez, H., Mbah, K. F., & Ghorbani, A. A. (2017). Towards a network-based framework for android malware detection and characterization. In 2017 15th Annual conference on privacy, security and trust (PST) (pp. 233\u201323309). IEEE.","DOI":"10.1109\/PST.2017.00035"},{"key":"7635_CR33","unstructured":"Raschka, S. (2019). Sequential feature selector\u2014mlxtend. [online] Rasbt.github.io. Retrieved August 15, 2019, from http:\/\/rasbt.github.io\/mlxtend\/user_guide\/feature_selection\/SequentialFeatureSelector\/."},{"key":"7635_CR34","unstructured":"Scikit-learn.org. (2019). 1.13. Feature selection\u2014scikit-learn 0.21.3 documentation. Retrieved August 15, 2019, from https:\/\/scikit-learn.org\/stable\/modules\/feature_selection.html#l1-based-feature-selection."},{"key":"7635_CR35","volume-title":"Machine learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T. M. (1997). Machine learning (1st ed.). New York, NY: McGraw-Hill, Inc.","edition":"1"},{"issue":"3","key":"7635_CR36","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, 20(3), 273\u2013297.","journal-title":"Machine Learning"},{"issue":"4","key":"7635_CR37","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1016\/j.eswa.2004.12.023","volume":"28","author":"S Tan","year":"2005","unstructured":"Tan, S. (2005). Neighbor-weighted k-nearest neighbor for unbalanced text corpus. Expert Systems with Applications, 28(4), 667\u2013671.","journal-title":"Expert Systems with Applications"},{"key":"7635_CR38","doi-asserted-by":"crossref","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"L Breiman","year":"2017","unstructured":"Breiman, L. (2017). Classification and regression trees. Abingdon: Routledge."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07635-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07635-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07635-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:24:00Z","timestamp":1625531040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07635-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,6]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7635"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07635-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,6]]},"assertion":[{"value":"6 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}