{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:35:50Z","timestamp":1774449350594,"version":"3.50.1"},"reference-count":166,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Mitacs Accelerate Program"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s12083-023-01508-7","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T10:01:42Z","timestamp":1688983302000},"page":"2153-2185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey"],"prefix":"10.1007","volume":"16","author":[{"given":"Jay","family":"Nagarajan","sequence":"first","affiliation":[]},{"given":"Pegah","family":"Mansourian","sequence":"additional","affiliation":[]},{"given":"Muhammad Anwar","family":"Shahid","sequence":"additional","affiliation":[]},{"given":"Arunita","family":"Jaekel","sequence":"additional","affiliation":[]},{"given":"Ikjot","family":"Saini","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Kneppers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"issue":"3","key":"1508_CR1","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1007\/s12083-020-01034-w","volume":"14","author":"X Ye","year":"2021","unstructured":"Ye X, Zhou J, Li Y, Cao M, Chen D, Qin Z (2021) A location privacy protection scheme for convoy driving in autonomous driving era. Peer Peer Netw Appl 14(3):1388\u20131400","journal-title":"Peer Peer Netw Appl"},{"issue":"3","key":"1508_CR2","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.011.2000560","volume":"35","author":"Q Yang","year":"2021","unstructured":"Yang Q, Fu S, Wang H, Fang H (2021) Machine-learning-enabled cooperative perception for connected autonomous vehicles: challenges and opportunities. IEEE Netw 35(3):96\u2013101","journal-title":"IEEE Netw"},{"issue":"11","key":"1508_CR3","doi-asserted-by":"crossref","first-page":"3275","DOI":"10.1109\/TITS.2016.2546555","volume":"17","author":"N Taherkhani","year":"2016","unstructured":"Taherkhani N, Pierre S (2016) Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm. IEEE Trans Intell Transp Syst 17(11):3275\u20133285","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"1508_CR4","doi-asserted-by":"crossref","first-page":"2757","DOI":"10.1007\/s12083-021-01073-x","volume":"14","author":"D Reebadiya","year":"2021","unstructured":"Reebadiya D, Rathod T, Gupta R, Tanwar S, Kumar N (2021) Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5G networks. Peer Peer Netw Appl 14(5):2757\u20132774","journal-title":"Peer Peer Netw Appl"},{"key":"1508_CR5","doi-asserted-by":"crossref","unstructured":"Sun X, Yu FR, Zhang P (2021) A survey on cyber-security of connected and autonomous vehicles (CAVS). IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2021.3085297"},{"issue":"2","key":"1508_CR6","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s12083-016-0431-x","volume":"10","author":"X Feng","year":"2017","unstructured":"Feng X, Li C-Y, Chen D-X, Tang J (2017) A method for defensing against multi-source sybil attacks in VANET. Peer Peer Netw Appl 10(2):305\u2013314","journal-title":"Peer Peer Netw Appl"},{"issue":"5","key":"1508_CR7","doi-asserted-by":"crossref","first-page":"1600","DOI":"10.1007\/s12083-020-00916-3","volume":"13","author":"S Wang","year":"2020","unstructured":"Wang S, Mao K, Zhan F, Liu D (2020) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer Peer Netw Appl 13(5):1600\u20131615","journal-title":"Peer Peer Netw Appl"},{"key":"1508_CR8","unstructured":"Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91)"},{"key":"1508_CR9","doi-asserted-by":"crossref","unstructured":"Kumar SV, Mary GAA, Suresh P, Uthirasamy R (2021) Investigation on cyber-attacks against in-vehicle network. In: 2021 7th International Conference on Electrical Energy Systems (ICEES). IEEE, pp 305\u2013311","DOI":"10.1109\/ICEES51510.2021.9383720"},{"key":"1508_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2007\/74706","volume":"2007","author":"M Wolf","year":"2007","unstructured":"Wolf M, Weimerskirch A, Wollinger T (2007) State of the art: embedding security in vehicles. EURASIP J Embed Syst 2007:1\u201316","journal-title":"EURASIP J Embed Syst"},{"key":"1508_CR11","doi-asserted-by":"crossref","first-page":"166365","DOI":"10.1109\/ACCESS.2019.2953568","volume":"7","author":"H Vdovic","year":"2019","unstructured":"Vdovic H, Babic J, Podobnik V (2019) Automotive software in connected and autonomous electric vehicles: a review. IEEE Access 7:166365\u2013166379","journal-title":"IEEE Access"},{"issue":"3","key":"1508_CR12","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1109\/TITS.2013.2258153","volume":"14","author":"N Lu","year":"2013","unstructured":"Lu N, Zhang N, Cheng N, Shen X, Mark JW, Bai F (2013) Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans Intell Transp Syst 14(3):1266\u20131277","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"7","key":"1508_CR13","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/MCOM.2017.1601156","volume":"55","author":"N Zhang","year":"2017","unstructured":"Zhang N, Zhang S, Yang P, Alhussein O, Zhuang W, Shen XS (2017) Software defined space-air-ground integrated vehicular networks: challenges and solutions. IEEE Commun Mag 55(7):101\u2013109","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"1508_CR14","doi-asserted-by":"crossref","first-page":"2524","DOI":"10.1007\/s12083-020-01013-1","volume":"14","author":"D Kumar","year":"2021","unstructured":"Kumar D, Barani S (2021) Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs). Peer Peer Netw Appl 14(4):2524\u20132536","journal-title":"Peer Peer Netw Appl"},{"issue":"4","key":"1508_CR15","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/JIOT.2014.2327587","volume":"1","author":"N Lu","year":"2014","unstructured":"Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: solutions and challenges. IEEE Internet Things J 1(4):289\u2013299","journal-title":"IEEE Internet Things J"},{"key":"1508_CR16","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.adhoc.2018.10.002","volume":"84","author":"G Loukas","year":"2019","unstructured":"Loukas G, Karapistoli E, Panaousis E, Sarigiannidis P, Bezemskij A, Vuong T (2019) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw 84:124\u2013147","journal-title":"Ad Hoc Netw"},{"key":"1508_CR17","volume":"103","author":"K Kim","year":"2021","unstructured":"Kim K, Kim JS, Jeong S, Park J-H, Kim HK (2021) Cybersecurity for autonomous vehicles: review of attacks and defense. Comput Secur 103:102150","journal-title":"Comput Secur"},{"issue":"7","key":"1508_CR18","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.3390\/electronics11071072","volume":"11","author":"G Karopoulos","year":"2022","unstructured":"Karopoulos G, Kambourakis G, Chatzoglou E, Hern\u00e1ndez-Ramos JL, Kouliaridis V (2022) Demystifying in-vehicle intrusion detection systems: a survey of surveys and a meta-taxonomy. Electronics 11(7):1072","journal-title":"Electronics"},{"key":"1508_CR19","doi-asserted-by":"crossref","first-page":"21266","DOI":"10.1109\/ACCESS.2019.2894183","volume":"7","author":"OY Al-Jarrah","year":"2019","unstructured":"Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7:21266\u201321289","journal-title":"IEEE Access"},{"issue":"3","key":"1508_CR20","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/TITS.2019.2908074","volume":"21","author":"W Wu","year":"2019","unstructured":"Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2019) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst 21(3):919\u2013933","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1508_CR21","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.procs.2021.04.014","volume":"184","author":"H Bangui","year":"2021","unstructured":"Bangui H, Buhnova B (2021) Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput Sci 184:877\u2013886","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"1508_CR22","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDAT.2019.2899062","volume":"36","author":"C Young","year":"2019","unstructured":"Young C, Zambreno J, Olufowobi H, Bloom G (2019) Survey of automotive controller area network intrusion detection systems. IEEE Des Test 36(6):48\u201355","journal-title":"IEEE Des Test"},{"key":"1508_CR23","unstructured":"LIN Specification Package (2003) Revision 2.0, LIN consortium"},{"key":"1508_CR24","unstructured":"FlexRay Consortium et\u00a0al (2010) Flexray communication systems protocol specification, version 3.0. 1 [ol]"},{"key":"1508_CR25","doi-asserted-by":"crossref","unstructured":"MOST Cooperation (2009) Most specification 3v0. pp 1\u201320","DOI":"10.7202\/800397ar"},{"key":"1508_CR26","volume-title":"Version 2","author":"CAN Specification","year":"1991","unstructured":"Specification CAN (1991) Version 2. Phillips Semiconductors, Hamburg"},{"key":"1508_CR27","doi-asserted-by":"crossref","unstructured":"Hank P, M\u00fcller S, Vermesan O, Van Den Keybus J (2013) Automotive ethernet: in-vehicle networking and smart mobility. In: Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE 2013:1735\u20131739","DOI":"10.7873\/DATE.2013.349"},{"key":"1508_CR28","unstructured":"IEEE 802.1 Working Group et al (1999) Local and metropolitan area networks-virtual bridged local area networks. IEEE Std 802.1 Q-1998"},{"key":"1508_CR29","unstructured":"IEEE Standards Association et al (2011) IEEE standard for local and metropolitan area networks\u2013timing and synchronization for time-sensitive applications in bridged local area networks. IEEE Std 802"},{"key":"1508_CR30","unstructured":"Steiner W (2008) Ttethemet specification"},{"issue":"5","key":"1508_CR31","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s12243-016-0551-6","volume":"72","author":"Y Sun","year":"2017","unstructured":"Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y, Cui X (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72(5):283\u2013295","journal-title":"Ann Telecommun"},{"key":"1508_CR32","doi-asserted-by":"crossref","unstructured":"Taylor A, Japkowicz N, Leblanc S (2015) Frequency-based anomaly detection for the automotive CAN BUS. In: 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, pp 45\u201349","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"1508_CR33","doi-asserted-by":"crossref","unstructured":"Marchetti M, Stabili D (2017) Anomaly detection of CAN bus messages through analysis of id sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, pp 1577\u20131583","DOI":"10.1109\/IVS.2017.7995934"},{"key":"1508_CR34","doi-asserted-by":"crossref","unstructured":"Lee H, Jeong SH, Kim HK (2017) Otids: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 57\u20135709","DOI":"10.1109\/PST.2017.00017"},{"key":"1508_CR35","doi-asserted-by":"crossref","unstructured":"Rieke R, Seidemann M, Talla EK, Zelle D, Seeger B (2017) Behavior analysis for safety and security in automotive systems. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, pp 381\u2013385","DOI":"10.1109\/PDP.2017.67"},{"key":"1508_CR36","doi-asserted-by":"crossref","unstructured":"Mo X, Chen P, Wang J, Wang C (2019) Anomaly detection of vehicle CAN network based on message content. In: International Conference on Security and Privacy in New Computing Environments. Springer, pp 96\u2013104","DOI":"10.1007\/978-3-030-21373-2_9"},{"key":"1508_CR37","doi-asserted-by":"crossref","unstructured":"Sunny J, Sankaran S, Saraswat V (2020) A hybrid approach for fast anomaly detection in controller area networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1\u20136","DOI":"10.1109\/ANTS50601.2020.9342791"},{"key":"1508_CR38","first-page":"26","volume":"23","author":"A Theissler","year":"2014","unstructured":"Theissler A (2014) Anomaly detection in recordings from in-vehicle networks. Big Data and Applications 23:26","journal-title":"Big Data and Applications"},{"key":"1508_CR39","doi-asserted-by":"crossref","first-page":"127580","DOI":"10.1109\/ACCESS.2019.2937576","volume":"7","author":"O Avatefipour","year":"2019","unstructured":"Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles\u2019 CAN bus using machine learning. IEEE Access 7:127580\u2013127592","journal-title":"IEEE Access"},{"issue":"6","key":"1508_CR40","doi-asserted-by":"crossref","first-page":"5112","DOI":"10.1109\/TIE.2019.2924870","volume":"67","author":"M Al-Saud","year":"2019","unstructured":"Al-Saud M, Eltamaly AM, Mohamed MA, Kavousi-Fard A (2019) An intelligent data-driven model to secure intravehicle communications based on machine learning. IEEE Trans Industr Electron 67(6):5112\u20135119","journal-title":"IEEE Trans Industr Electron"},{"key":"1508_CR41","doi-asserted-by":"crossref","unstructured":"Narayanan SN, Mittal S, Joshi A (2016) Obd_securealert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 1\u20136","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"1508_CR42","doi-asserted-by":"crossref","unstructured":"Levi M, Allouche Y, Kontorovich A (2018) Advanced analytics for connected car cybersecurity. In: 2018 IEEE 87th vehicular technology conference (VTC spring). IEEE, pp 1\u20137","DOI":"10.1109\/VTCSpring.2018.8417690"},{"key":"1508_CR43","doi-asserted-by":"crossref","unstructured":"Casillo M, Coppola S, De Santo M, Pascale F, Santonicola E (2019) Embedded intrusion detection system for detecting attacks over CAN-BUS. In: 2019 4th International Conference on System Reliability and Safety (ICSRS). IEEE, pp 136\u2013141","DOI":"10.1109\/ICSRS48664.2019.8987605"},{"key":"1508_CR44","doi-asserted-by":"crossref","unstructured":"Tian D, Li Y, Wang Y, Duan X, Wang C, Wang W, Hui R, Guo P (2017) An intrusion detection system based on machine learning for CAN-BUS. In: International Conference on Industrial Networks and Intelligent Systems. Springer, pp 285\u2013294","DOI":"10.1007\/978-3-319-74176-5_25"},{"key":"1508_CR45","doi-asserted-by":"crossref","first-page":"2941","DOI":"10.1109\/TIFS.2021.3069171","volume":"16","author":"ML Han","year":"2021","unstructured":"Han ML, Kwak BI, Kim HK (2021) Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Trans Inf Forensics Secur 16:2941\u20132956","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1508_CR46","doi-asserted-by":"crossref","unstructured":"Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multi-tiered hybrid intrusion detection system for internet of vehicles.\u00a0IEEE Internet Things J","DOI":"10.1109\/ICC45855.2022.9838780"},{"key":"1508_CR47","doi-asserted-by":"crossref","unstructured":"Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, pp 1\u20135","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"1508_CR48","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2019.101974","volume":"95","author":"J Zhang","year":"2019","unstructured":"Zhang J, Li F, Zhang H, Li R, Li Y (2019) Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw 95:101974","journal-title":"Ad Hoc Netw"},{"key":"1508_CR49","doi-asserted-by":"crossref","first-page":"9091","DOI":"10.1109\/ACCESS.2018.2799210","volume":"6","author":"C Wang","year":"2018","unstructured":"Wang C, Zhao Z, Gong L, Zhu L, Liu Z, Cheng X (2018) A distributed anomaly detection system for in-vehicle network using htm. IEEE Access 6:9091\u20139098","journal-title":"IEEE Access"},{"issue":"9","key":"1508_CR50","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464\u20131480","journal-title":"Proc IEEE"},{"key":"1508_CR51","doi-asserted-by":"crossref","unstructured":"Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198","DOI":"10.1016\/j.vehcom.2019.100198"},{"issue":"15","key":"1508_CR52","doi-asserted-by":"crossref","first-page":"5062","DOI":"10.3390\/app10155062","volume":"10","author":"VS Barletta","year":"2020","unstructured":"Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) A kohonen som architecture for intrusion detection on in-vehicle communication networks. Appl Sci 10(15):5062","journal-title":"Appl Sci"},{"issue":"14","key":"1508_CR53","doi-asserted-by":"crossref","first-page":"4736","DOI":"10.3390\/s21144736","volume":"21","author":"ST Mehedi","year":"2021","unstructured":"Mehedi ST, Anwar A, Rahman Z, Ahmed K (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736","journal-title":"Sensors"},{"key":"1508_CR54","doi-asserted-by":"crossref","unstructured":"Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, pp 130\u2013139","DOI":"10.1109\/DSAA.2016.20"},{"issue":"5","key":"1508_CR55","doi-asserted-by":"crossref","first-page":"4275","DOI":"10.1109\/TVT.2019.2907269","volume":"68","author":"K Zhu","year":"2019","unstructured":"Zhu K, Chen Z, Peng Y, Zhang L (2019) Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM. IEEE Trans Veh Technol 68(5):4275\u20134284","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"1508_CR56","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.3390\/sym11111388","volume":"11","author":"J Xiao","year":"2019","unstructured":"Xiao J, Wu H, Li X (2019) Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning. Symmetry 11(11):1388","journal-title":"Symmetry"},{"key":"1508_CR57","doi-asserted-by":"crossref","first-page":"185489","DOI":"10.1109\/ACCESS.2020.3029307","volume":"8","author":"MD Hossain","year":"2020","unstructured":"Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) LSTM-based intrusion detection system for in-vehicle CAN bus communications. IEEE Access 8:185489\u2013185502","journal-title":"IEEE Access"},{"key":"1508_CR58","unstructured":"Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach In: GLOBECOM 2020\u20132020 IEEE Global Communications Conference. IEEE, pp 1\u20136"},{"key":"1508_CR59","doi-asserted-by":"crossref","unstructured":"Balaji P, Ghaderi M (2021) Neurocan: contextual anomaly detection in controller area networks. In: 2021 IEEE International Smart Cities Conference (ISC2). IEEE, pp 1\u20137","DOI":"10.1109\/ISC253183.2021.9562830"},{"key":"1508_CR60","doi-asserted-by":"crossref","unstructured":"Balaji P, Ghaderi M, Zhang H (2022) Canlite: anomaly detection in controller area networks with multitask learning. In: 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, pp 1\u20135","DOI":"10.1109\/VTC2022-Spring54318.2022.9860358"},{"issue":"2","key":"1508_CR61","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","volume":"8","author":"AR Javed","year":"2021","unstructured":"Javed AR, Ur Rehman S, Khan MU, Alazab M, Reddy T (2021) Canintelliids: aetecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456\u20131466","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"10","key":"1508_CR62","doi-asserted-by":"crossref","first-page":"10880","DOI":"10.1109\/TVT.2021.3106940","volume":"70","author":"H Sun","year":"2021","unstructured":"Sun H, Chen M, Weng J, Liu Z, Geng G (2021) Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism. IEEE Trans Veh Technol 70(10):10880\u201310893","journal-title":"IEEE Trans Veh Technol"},{"key":"1508_CR63","doi-asserted-by":"crossref","unstructured":"Thiruloga SV, Kukkala VK, Pasricha S (2022) Tenet: temporal CNN with attention for anomaly detection in automotive cyber-physical systems. In: 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, pp 326\u2013331","DOI":"10.1109\/ASP-DAC52403.2022.9712524"},{"key":"1508_CR64","doi-asserted-by":"crossref","unstructured":"Lokman SF, Othman AT, Musa S, Abu Bakar MH (2019) Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN) In: Progress in Engineering Technology. Springer, pp 195\u2013205","DOI":"10.1007\/978-3-030-28505-0_16"},{"key":"1508_CR65","doi-asserted-by":"crossref","unstructured":"Lin Y, Chen C, Xiao F, Avatefipour O, Alsubhi K, Yunianta A (2020) An evolutionary deep learning anomaly detection framework for in-vehicle networks-CAN bus.\u00a0IEEE Trans Ind Appl","DOI":"10.1109\/TIA.2020.3009906"},{"key":"1508_CR66","doi-asserted-by":"crossref","unstructured":"Jaoudi Y, Yakopcic C, Taha T (2020) Conversion of an unsupervised anomaly detection system to spiking neural network for car hacking identification. In: 2020 11th International Green and Sustainable Computing Workshops (IGSC). IEEE, pp 1\u20134","DOI":"10.1109\/IGSC51522.2020.9291232"},{"issue":"2","key":"1508_CR67","doi-asserted-by":"crossref","first-page":"1913","DOI":"10.1109\/TNSM.2020.3038991","volume":"18","author":"S Longari","year":"2020","unstructured":"Longari S, Valcarcel DHN, Zago M, Carminati M, Zanero S (2020) Cannolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans Netw Serv Manage 18(2):1913\u20131924","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"1508_CR68","doi-asserted-by":"crossref","first-page":"58194","DOI":"10.1109\/ACCESS.2020.2982544","volume":"8","author":"M Hanselmann","year":"2020","unstructured":"Hanselmann M, Strauss T, Dormann K, Ulmer H (2020) Canet: an unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access 8:58194\u201358205","journal-title":"IEEE Access"},{"key":"1508_CR69","doi-asserted-by":"crossref","unstructured":"Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems.\u00a0IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2020.3017882"},{"key":"1508_CR70","doi-asserted-by":"crossref","unstructured":"Seo E, Song HM, Kim HK (2018) Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 1\u20136","DOI":"10.1109\/PST.2018.8514157"},{"issue":"7","key":"1508_CR71","doi-asserted-by":"crossref","first-page":"119","DOI":"10.3390\/fi12070119","volume":"12","author":"VS Barletta","year":"2020","unstructured":"Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) Intrusion detection for in-vehicle communication networks: an unsupervised kohonen som approach. Future Internet 12(7):119","journal-title":"Future Internet"},{"issue":"5s","key":"1508_CR72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3476998","volume":"20","author":"VK Kukkala","year":"2021","unstructured":"Kukkala VK, Thiruloga SV, Pasricha S (2021) Latte: LSTM self-att ention based anomaly detection in e mbedded automotive platforms. ACM Transactions on Embedded Computing Systems (TECS) 20(5s):1\u201323","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"issue":"2","key":"1508_CR73","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/TVT.2021.3051026","volume":"70","author":"HM Song","year":"2021","unstructured":"Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098\u20131108","journal-title":"IEEE Trans Veh Technol"},{"key":"1508_CR74","first-page":"7","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANET security challenges and solutions: a survey. Veh Commun 7:7\u201320","journal-title":"Veh Commun"},{"issue":"6","key":"1508_CR75","doi-asserted-by":"crossref","first-page":"6374","DOI":"10.1109\/TVT.2020.2987014","volume":"69","author":"B Qian","year":"2020","unstructured":"Qian B, Zhou H, Ma T, Xu Y, Yu K, Shen X, Hou F (2020) Leveraging dynamic stackelberg pricing game for multi-mode spectrum sharing in 5G-VANET. IEEE Trans Veh Technol 69(6):6374\u20136387","journal-title":"IEEE Trans Veh Technol"},{"key":"1508_CR76","doi-asserted-by":"crossref","unstructured":"Shahid MA, Jaekel A, Ezeife C, Al-Ajmi Q, Saini I (2018) Review of potential security attacks in vanet. In: 2018 Majan International Conference (MIC). IEEE, pp 1\u20134","DOI":"10.1109\/MINTC.2018.8363152"},{"issue":"7","key":"1508_CR77","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"JB Kenney","year":"2011","unstructured":"Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proc IEEE 99(7):1162\u20131182","journal-title":"Proc IEEE"},{"issue":"6","key":"1508_CR78","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3390\/fi11060122","volume":"11","author":"A Bazzi","year":"2019","unstructured":"Bazzi A, Cecchini G, Menarini M, Masini BM, Zanella A (2019) Survey and perspectives of vehicular wi-fi versus sidelink cellular-v2x in the 5G era. Future Internet 11(6):122","journal-title":"Future Internet"},{"key":"1508_CR79","unstructured":"Kumar A, Bansal M et\u00a0al (2017) A review on vanet security attacks and their countermeasure. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, pp 580\u2013585"},{"issue":"16","key":"1508_CR80","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.3390\/s19163589","volume":"19","author":"MS Sheikh","year":"2019","unstructured":"Sheikh MS, Liang J, Wang W (2019) A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs). Sensors 19(16):3589","journal-title":"Sensors"},{"issue":"5","key":"1508_CR81","doi-asserted-by":"crossref","first-page":"4834","DOI":"10.1109\/TVT.2019.2905522","volume":"68","author":"A Yang","year":"2019","unstructured":"Yang A, Weng J, Cheng N, Ni J, Lin X, Shen X (2019) Deqos attack: degrading quality of service in VANETs and its mitigation. IEEE Trans Veh Technol 68(5):4834\u20134845","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1508_CR82","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/COMST.2017.2771522","volume":"20","author":"A Boualouache","year":"2017","unstructured":"Boualouache A, Senouci S-M, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutorials 20(1):770\u2013790","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1508_CR83","doi-asserted-by":"crossref","unstructured":"Boudhir A, Benahmed M, Ghadi A, Bouhorma M (2016) Vehicular navigation spoofing detection based on v2i calibration. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt). IEEE, pp 847\u2013849","DOI":"10.1109\/CIST.2016.7805006"},{"issue":"1","key":"1508_CR84","doi-asserted-by":"crossref","first-page":"45","DOI":"10.33851\/JMIS.2020.7.1.45","volume":"7","author":"A Quyoom","year":"2020","unstructured":"Quyoom A, Mir AA, Sarwar A (2020) Security attacks and challenges of VANETs: a literature survey. Journal of Multimedia Information System 7(1):45\u201354","journal-title":"Journal of Multimedia Information System"},{"key":"1508_CR85","doi-asserted-by":"crossref","unstructured":"Chhatwal SS, Sharma M (2015) Detection of impersonation attack in VANETs using buck filter and VANET content fragile watermarking (VCFW). In: 2015 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp 1\u20135","DOI":"10.1109\/ICCCI.2015.7218093"},{"key":"1508_CR86","doi-asserted-by":"crossref","unstructured":"Ahmed W, Elhadef, M (2018) Dos attacks and countermeasures in VANETs. In: Advanced Multimedia and Ubiquitous Engineering. Springer, pp 333\u2013341","DOI":"10.1007\/978-981-13-1328-8_43"},{"key":"1508_CR87","doi-asserted-by":"crossref","unstructured":"Ilavendhan A, Saruladha K (2020) Comparative analysis of various approaches for dos attack detection in VANETs. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 821\u2013825","DOI":"10.1109\/ICESC48915.2020.9155737"},{"key":"1508_CR88","doi-asserted-by":"crossref","unstructured":"Kumar S, Mann KS (2019) Prevention of dos attacks by detection of multiple malicious nodes in VANETs. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM). IEEE, pp 89\u201394","DOI":"10.1109\/ICACTM.2019.8776846"},{"key":"1508_CR89","doi-asserted-by":"crossref","unstructured":"Malebary S, Xu W, Huang C-T (2016) Jamming mobility in 802.11 p networks: modeling, evaluation, and detection. In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC). IEEE, pp 1\u20137","DOI":"10.1109\/PCCC.2016.7820665"},{"key":"1508_CR90","doi-asserted-by":"crossref","unstructured":"Lachdhaf S, Mazouzi M, Abid M et\u00a0al (2017) Detection and prevention of black hole attack in VANET using secured aodv routing protocol. In: International Conference on Networks & Communications (NetCom 2017), Dubai. pp 25\u201336","DOI":"10.5121\/csit.2017.71503"},{"issue":"1","key":"1508_CR91","first-page":"16","volume":"1","author":"FN Bhatti","year":"2015","unstructured":"Bhatti FN, Ahmad RB, Abu Bakar MS, Daud S, Elias S, Warip M (2015) Analyze the VANET performance in presence of timing attack and sinkhole attack using OMNET++. Journal of Advanced Research in Computing and Applications 1(1):16\u201331","journal-title":"Journal of Advanced Research in Computing and Applications"},{"key":"1508_CR92","unstructured":"Sumra IA, Ab Manan J-L, Hasbullah H (2011) Timing attack in vehicular network. In: Proceedings of the 15th WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS), Corfu Island, Greece, pp 151\u2013155"},{"key":"1508_CR93","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.procs.2021.02.010","volume":"182","author":"MH Junejo","year":"2021","unstructured":"Junejo MH, Ab Rahman AA-H, Shaikh RA, Yusof KM (2021) Location closeness model for VANETs with integration of 5G. Procedia Comput Sci 182:71\u201379","journal-title":"Procedia Comput Sci"},{"key":"1508_CR94","doi-asserted-by":"crossref","unstructured":"Choudhari DP, Dorle SS (2019) Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and DDOS attacks in vanet. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp 1\u20138","DOI":"10.1109\/ICCCNT45670.2019.8944485"},{"issue":"11","key":"1508_CR95","doi-asserted-by":"crossref","first-page":"4040","DOI":"10.3390\/s18114040","volume":"18","author":"F Ahmad","year":"2018","unstructured":"Ahmad F, Adnane A, Franqueira VN, Kurugollu F, Liu L (2018) Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers\u2019 strategies. Sensors 18(11):4040","journal-title":"Sensors"},{"key":"1508_CR96","doi-asserted-by":"crossref","first-page":"150914","DOI":"10.1109\/ACCESS.2020.3017018","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access 8:150914\u2013150928","journal-title":"IEEE Access"},{"key":"1508_CR97","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.ins.2020.05.087","volume":"540","author":"Y Pu","year":"2020","unstructured":"Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308\u2013324","journal-title":"Inf Sci"},{"key":"1508_CR98","doi-asserted-by":"crossref","unstructured":"Saini I, Saad S, Jaekel A (2020) A context aware and traffic adaptive privacy scheme in VANETs. In: 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS). IEEE, pp 1\u20135","DOI":"10.1109\/CAVS51000.2020.9334559"},{"key":"1508_CR99","doi-asserted-by":"crossref","unstructured":"Emara K (2016) Poster: Prext: privacy extension for veins VANET simulator. In: 2016 IEEE Vehicular Networking Conference (VNC). IEEE, pp 1\u20132","DOI":"10.1109\/VNC.2016.7835979"},{"key":"1508_CR100","doi-asserted-by":"crossref","unstructured":"Kamel J, Wolf M, van der Hei RW, Kaiser A, Urien P, Kargl F (2020) Veremi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: ICC 2020\u20132020 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"1508_CR101","doi-asserted-by":"crossref","unstructured":"van der Heijden RW, Lukaseder T, Kargl F (2018) Veremi: a dataset for comparable evaluation of misbehavior detection in VANETs. Preprint at http:\/\/arxiv.org\/abs\/1804.06701","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"1508_CR102","doi-asserted-by":"crossref","unstructured":"Kamel J, Haidar F, Jemaa IB, Kaiser A, Lonc B, Urien P (2019) A misbehavior authority system for sybil attack detection in C-ITS. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, pp 1117\u20131123","DOI":"10.1109\/UEMCON47517.2019.8993045"},{"key":"1508_CR103","doi-asserted-by":"crossref","unstructured":"Singh PK, Gupta RR, Nandi SK, Nandi S (2019) Machine learning based approach to detect wormhole attack in VANETs. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, pp 651\u2013661","DOI":"10.1007\/978-3-030-15035-8_63"},{"issue":"1","key":"1508_CR104","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","volume":"21","author":"RW van der Heijden","year":"2018","unstructured":"van der Heijden RW, Dietzel S, Leinm\u00fcller T, Kargl F (2018) Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun Surv Tutorials 21(1):779\u2013811","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1508_CR105","doi-asserted-by":"crossref","unstructured":"Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops. IEEE, pp 1\u20135","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"1508_CR106","doi-asserted-by":"crossref","unstructured":"Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In: GLOBECOM 2009\u20132009 IEEE Global Telecommunications Conference. IEEE, pp 1\u20135","DOI":"10.1109\/GLOCOM.2009.5425381"},{"key":"1508_CR107","doi-asserted-by":"crossref","unstructured":"Pu\u00f1al O, Aguiar A, Gross J (2012) In VANETs we trust? Characterizing RF jamming in vehicular networks. In: Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications. pp 83\u201392","DOI":"10.1145\/2307888.2307903"},{"issue":"8","key":"1508_CR108","doi-asserted-by":"crossref","first-page":"6703","DOI":"10.1109\/TVT.2015.2480244","volume":"65","author":"K Zaidi","year":"2015","unstructured":"Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2015) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703\u20136714","journal-title":"IEEE Trans Veh Technol"},{"key":"1508_CR109","doi-asserted-by":"crossref","unstructured":"Grover J, Prajapati NK, Laxmi V, Gaur MS (2011) Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications. Springer, pp 644\u2013653","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"1508_CR110","doi-asserted-by":"crossref","unstructured":"Gyawali S, Qian Y (2019) Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019\u20132019 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2019.8761300"},{"key":"1508_CR111","doi-asserted-by":"crossref","unstructured":"Zeng Y, Qiu M, Zhu D, Xue Z, Xiong J, Liu M (2019) DEEPVCM: a deep learning based intrusion detection method in VANET. In: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, pp 288\u2013293","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00060"},{"key":"1508_CR112","doi-asserted-by":"crossref","unstructured":"Montenegro J, Iza C, Aguilar Igartua M (2020) Detection of position falsification attacks in VANETs applying trust model and machine learning. In: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks. pp 9\u201316","DOI":"10.1145\/3416011.3424757"},{"key":"#cr-split#-1508_CR113.1","unstructured":"Wang S-Y, Lin C-C (2008) NCTUNS 5.0: a network simulator for IEEE 802.11"},{"key":"#cr-split#-1508_CR113.2","unstructured":"(p) and 1609 wireless vehicular network researches. In: 2008 IEEE 68th Vehicular Technology Conference. IEEE, pp 1-2"},{"key":"1508_CR114","unstructured":"Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: practical machine learning tools and techniques with Java implementations"},{"key":"1508_CR115","doi-asserted-by":"crossref","unstructured":"So S, Sharma P, Petit J (2018) Integrating plausibility checks and machine learning for misbehavior detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 564\u2013571","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"1508_CR116","doi-asserted-by":"crossref","unstructured":"Sharma A, Jaekel A (2021) Machine learning approach for detecting location spoofing in VANET. In: 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCN52240.2021.9522170"},{"key":"1508_CR117","doi-asserted-by":"crossref","unstructured":"Lopez PA, Behrisch M, Bieker-Walz L, Erdmann J, Fl\u00f6tter\u00f6d Y-P, Hilbrich R, L\u00fccken L, Rummel J, Wagner P, Wie\u00dfner E (2018) Microscopic traffic simulation using sumo. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, pp 2575\u20132582","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"1508_CR118","doi-asserted-by":"crossref","unstructured":"Riley GF, Henderson TR (2010) The NS-3 network simulator. In: Modeling and Tools for Network Simulation. Springer, pp 15\u201334","DOI":"10.1007\/978-3-642-12331-3_2"},{"issue":"4","key":"1508_CR119","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2008.80","volume":"7","author":"M Haklay","year":"2008","unstructured":"Haklay M, Weber P (2008) Openstreetmap: User-generated street maps. IEEE Pervasive Comput 7(4):12\u201318","journal-title":"IEEE Pervasive Comput"},{"issue":"1","key":"1508_CR120","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TMC.2010.133","volume":"10","author":"C Sommer","year":"2010","unstructured":"Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans Mob Comput 10(1):3\u201315","journal-title":"IEEE Trans Mob Comput"},{"key":"1508_CR121","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.cose.2018.06.008","volume":"78","author":"EA Shams","year":"2018","unstructured":"Shams EA, Rizaner A, Ulusoy AH (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Comput Secur 78:245\u2013254","journal-title":"Comput Secur"},{"issue":"6","key":"1508_CR122","doi-asserted-by":"crossref","first-page":"4991","DOI":"10.1109\/JIOT.2020.3035035","volume":"8","author":"P Sharma","year":"2020","unstructured":"Sharma P, Liu H (2020) A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J 8(6):4991\u20134999","journal-title":"IEEE Internet Things J"},{"key":"1508_CR123","first-page":"56","volume":"13","author":"D Karagiannis","year":"2018","unstructured":"Karagiannis D, Argyriou A (2018) Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh Commun 13:56\u201363","journal-title":"Veh Commun"},{"key":"1508_CR124","doi-asserted-by":"crossref","unstructured":"Oucheikh R, Fri M, Fedouaki F, Hain M (2020) Deep anomaly detector based on spatio-temporal clustering for connected autonomous vehicles. In: International Conference on Ad Hoc Networks. Springer, pp 201\u2013212","DOI":"10.1007\/978-3-030-67369-7_15"},{"key":"1508_CR125","unstructured":"Wyoming dot connected vehicle pilot improving safety and travel reliability on i\u201380 in Wyoming. [Online]. https:\/\/wydotcvp.wyoroad.info\/"},{"key":"1508_CR126","doi-asserted-by":"crossref","unstructured":"Aneja MJS, Bhatia T, Sharma G, Shrivastava G (2018) Artificial intelligence based intrusion detection system to detect flooding attack in VANETs. In: Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, pp 87\u2013100","DOI":"10.4018\/978-1-5225-4100-4.ch006"},{"issue":"5","key":"1508_CR127","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1007\/s12559-018-9564-y","volume":"10","author":"BG Atli","year":"2018","unstructured":"Atli BG, Miche Y, Kalliola A, Oliver I, Holtmanns S, Lendasse A (2018) Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space. Cogn Comput 10(5):848\u2013863","journal-title":"Cogn Comput"},{"key":"1508_CR128","doi-asserted-by":"crossref","unstructured":"Uprety A, Rawat DB, Li J (2021) Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1\u20136","DOI":"10.1109\/CCNC49032.2021.9369513"},{"key":"1508_CR129","unstructured":"Jaton N (2021) Distributed neural network based architecture for DDOS detection in vehicular communication systems"},{"key":"1508_CR130","unstructured":"Varga A (2001) Discrete event simulation system. In: Proceedings of the European Simulation Multiconference (ESM\u20192001). pp 1\u20137"},{"key":"1508_CR131","unstructured":"Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo-simulation of urban mobility. International Journal on Advances in Systems and Measurements 5(3 &4)"},{"issue":"2","key":"1508_CR132","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MITS.2017.2666585","volume":"9","author":"L Codec\u00e1","year":"2017","unstructured":"Codec\u00e1 L, Frank R, Faye S, Engel T (2017) Luxembourg sumo traffic (lust) scenario: traffic demand evaluation. IEEE Intell Transp Syst Mag 9(2):52\u201363","journal-title":"IEEE Intell Transp Syst Mag"},{"key":"1508_CR133","unstructured":"Chakirov A, Fourie PJ (2014) Enriched sioux falls scenario with dynamic and disaggregate demand. Arbeitsberichte Verkehrs-und Raumplanung 978"},{"key":"1508_CR134","doi-asserted-by":"crossref","unstructured":"Axhausen KW, Horni A, Nagel K (2016) The multi-agent transport simulation MATSim. Ubiquity Press","DOI":"10.5334\/baw"},{"key":"1508_CR135","doi-asserted-by":"crossref","unstructured":"Uppoor S, Fiore M (2011) Large-scale urban vehicular mobility for networking research. In: 2011 IEEE Vehicular Networking Conference (VNC). IEEE, pp 62\u201369","DOI":"10.1109\/VNC.2011.6117125"},{"key":"1508_CR136","doi-asserted-by":"crossref","unstructured":"Pign\u00e9 Y, Danoy G, Bouvry P (2011) A vehicular mobility model based on real traffic counting data. In: International Workshop on Communication Technologies for Vehicles. Springer, pp 131\u2013142","DOI":"10.1007\/978-3-642-19786-4_12"},{"key":"1508_CR137","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"8","key":"1508_CR138","doi-asserted-by":"crossref","first-page":"1311","DOI":"10.3390\/math8081311","volume":"8","author":"Q He","year":"2020","unstructured":"He Q, Meng X, Qu R, Xi R (2020) Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics 8(8):1311","journal-title":"Mathematics"},{"key":"1508_CR139","doi-asserted-by":"crossref","unstructured":"Kim M, Jang I, Choo S, Koo J, Pack S (2017) Collaborative security attack detection in software-defined vehicular networks. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, pp 19\u201324","DOI":"10.1109\/APNOMS.2017.8094172"},{"key":"1508_CR140","doi-asserted-by":"crossref","first-page":"154560","DOI":"10.1109\/ACCESS.2019.2948382","volume":"7","author":"Y Gao","year":"2019","unstructured":"Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560\u2013154571","journal-title":"IEEE Access"},{"key":"1508_CR141","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"1508_CR142","doi-asserted-by":"crossref","unstructured":"Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. pp 29\u201336","DOI":"10.1145\/1978672.1978676"},{"issue":"1","key":"1508_CR143","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1080\/21642583.2018.1440260","volume":"6","author":"KM Ali Alheeti","year":"2018","unstructured":"Ali Alheeti KM, McDonald-Maier K (2018) Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst Sci Control Eng 6(1):48\u201356","journal-title":"Syst Sci Control Eng"},{"issue":"3","key":"1508_CR144","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374","journal-title":"Comput Secur"},{"key":"1508_CR145","doi-asserted-by":"crossref","unstructured":"Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th International Conference on Security of Information and Networks. pp 1\u20136","DOI":"10.1145\/3264437.3264479"},{"key":"1508_CR146","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves F, Ribeiro B, Gama O, Santos J, Costa A, Dias B, Nicolau MJ, Macedo J, Santos A (2020) Synthesizing datasets with security threats for vehicular ad-hoc networks. In: GLOBECOM 2020\u20132020 IEEE Global Communications Conference. IEEE, pp 1\u20136","DOI":"10.1109\/GLOBECOM42002.2020.9348149"},{"issue":"14","key":"1508_CR147","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1016\/j.comnet.2011.05.005","volume":"55","author":"B Sch\u00fcnemann","year":"2011","unstructured":"Sch\u00fcnemann B (2011) V2x simulation runtime infrastructure Vsimrti: an assessment tool to design smart traffic management systems. Comput Netw 55(14):3189\u20133198","journal-title":"Comput Netw"},{"key":"1508_CR148","unstructured":"Dataset collection. (2020, Dec). Accessed September 20, 2021. [Online]. https:\/\/github.com\/fabio-r-goncalves\/dataset-collection"},{"issue":"3","key":"1508_CR149","doi-asserted-by":"crossref","first-page":"155014772110002","DOI":"10.1177\/15501477211000287","volume":"17","author":"FA Alhaidari","year":"2021","unstructured":"Alhaidari FA, Alrehan AM (2021) A simulation work for generating a novel dataset to detect distributed denial of service attacks on vehicular ad hoc network systems. Int J Distrib Sens Netw 17(3):15501477211000288","journal-title":"Int J Distrib Sens Netw"},{"key":"1508_CR150","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842","journal-title":"Ad Hoc Netw"},{"key":"1508_CR151","unstructured":"Wyoming D (2018) Connected vehicle pilot: improving safety and travel reliability on 1\u201380 in Wyoming"},{"key":"1508_CR152","unstructured":"Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng"},{"key":"1508_CR153","unstructured":"Dupont G, Lekidis A, Den Hartog J, Etalle S (2019) Automotive controller area network (CAN) BUS intrusion dataset v. 2"},{"issue":"2","key":"1508_CR154","first-page":"993","volume":"16","author":"S Woo","year":"2014","unstructured":"Woo S, Jo HJ, Lee DH (2014) A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans Intell Transp Syst 16(2):993\u20131006","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1508_CR155","unstructured":"Syncan dataset (2020, Apr) Accessed September 20, 2021. [Online]. https:\/\/github.com\/etas\/SynCAN"},{"key":"1508_CR156","unstructured":"Verma ME, Iannacone MD, Bridges RA, Hollifield SC, Moriano P, Kay B, Combs FL (2022) Addressing the lack of comparability & testing in CAN intrusion detection research: a comprehensive guide to CAN IDS data & introduction of the road dataset"},{"key":"1508_CR157","doi-asserted-by":"crossref","unstructured":"Berger I, Rieke R, Kolomeets M, Chechulin A, Kotenko I (2018) Comparative study of machine learning methods for in-vehicle intrusion detection. In: Computer Security. Springer, pp 85\u2013101","DOI":"10.1007\/978-3-030-12786-2_6"},{"key":"1508_CR158","doi-asserted-by":"crossref","unstructured":"Gunduz MZ, Das R (2018) A comparison of cyber-security oriented testbeds for IoT-based smart grids. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, pp 1\u20136","DOI":"10.1109\/ISDFS.2018.8355329"},{"key":"1508_CR159","unstructured":"California connected vehicle testbed - home. [Online]. https:\/\/caconnectedvehicletestbed.org\/index.php\/. Accessed 17 Sept 2021"},{"key":"1508_CR160","unstructured":"Test bed for connected and autonomous vehicles: Cav. [Online]. https:\/\/www.millbrook.us\/services\/connected-and-autonomous-vehicle-testing\/. Accessed 17 Sept 2021"},{"key":"1508_CR161","unstructured":"Everett CE, McCoy D (2013) OCTANE (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. In: 6th Workshop on Cyber Security Experimentation and Test (CSET 13)"},{"key":"1508_CR162","unstructured":"Dosovitskiy A, Ros G, Codevilla F, Lopez A, Koltun V (2017) Carla: an open urban driving simulator. In: Conference on Robot Learning. PMLR, pp 1\u201316"},{"key":"1508_CR163","unstructured":"Gss7000 series GNSS constellatio simulator (2021) Spirent Communications PLC"},{"key":"1508_CR164","unstructured":"SimHiL Datasheet (2021) Spirent Communications PLC"},{"key":"1508_CR165","unstructured":"V2x test tools (2020, Jul) [Online].\u00a0https:\/\/www.danlawinc.com\/v2xtesttools\/. Accessed 20 Sept 2021"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01508-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01508-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01508-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T13:23:10Z","timestamp":1695993790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01508-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":166,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1508"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01508-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"4 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Yes","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"No","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}