{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T23:45:44Z","timestamp":1769989544176,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research on the Vehicle-Road Integration Intelligent Transportation Data Model and Cybersecurity Technology Project"},{"name":"State Key Laboratory of Intelligent Transportation System"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02008-6","type":"journal-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:03:50Z","timestamp":1751414630000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["AI-driven proactive security defense in distributed iov systems: Cyber threat intelligence modeling for connected autonomous vehicles"],"prefix":"10.1007","volume":"18","author":[{"given":"Yinghui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yufeng","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Haiyang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Yilong","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Rong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"issue":"22","key":"2008_CR1","first-page":"35942","volume":"11","author":"IU Din","year":"2024","unstructured":"Din IU, Almogren A, Rodrigues JJPC (2024) Aiot integration in autonomous vehicles: Enhancing road cooperation and traffic management. IEEE Int Things J 11(22):35942\u201335949","journal-title":"IEEE Int Things J"},{"key":"2008_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.iotcps.2022.05.001","volume":"2","author":"D Chen","year":"2022","unstructured":"Chen D, Lv Z (2022) Artificial intelligence enabled digital twins for training autonomous cars. Int Things Cyber-Physical Syst 2:31\u201341","journal-title":"Int Things Cyber-Physical Syst"},{"key":"2008_CR3","doi-asserted-by":"crossref","unstructured":"Bendiab G, Hameurlaine A, Germanos G, Kolokotronis N, Shiaeles S (2023) Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence. IEEE Trans Intell Transport Syst","DOI":"10.1109\/TITS.2023.3236274"},{"issue":"9","key":"2008_CR4","doi-asserted-by":"publisher","first-page":"5717","DOI":"10.1109\/TSMC.2024.3409314","volume":"54","author":"S Bergies","year":"2024","unstructured":"Bergies S, Aljohani TM, Su S, Elsisi M (2024) An iot-based deep-learning architecture to secure automated electric vehicles against cyberattacks and data loss. IEEE Trans Syst Man Cybern Syst 54(9):5717\u20135732","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"2008_CR5","unstructured":"Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91):1\u201391"},{"issue":"6","key":"2008_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MCE.2022.3154346","volume":"11","author":"VK Kukkala","year":"2022","unstructured":"Kukkala VK, Thiruloga SV, Pasricha S (2022) Roadmap for cybersecurity in autonomous vehicles. IEEE Consumer Electron Mag 11(6):13\u201323","journal-title":"IEEE Consumer Electron Mag"},{"key":"2008_CR7","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/OJCOMS.2022.3169500","volume":"3","author":"M Hataba","year":"2022","unstructured":"Hataba M, Sherif A, Mahmoud M, Abdallah M, Alasmary W (2022) Security and privacy issues in autonomous vehicles: A layer-based survey. IEEE Open J Commun Soc 3:811\u2013829","journal-title":"IEEE Open J Commun Soc"},{"key":"2008_CR8","doi-asserted-by":"crossref","unstructured":"Mansourian P, Zhang N, Jaekel A, Kneppers M (2023) Deep learning-based anomaly detection for connected autonomous vehicles using spatiotemporal information. IEEE Trans Intell Transport Syst","DOI":"10.1109\/TITS.2023.3286611"},{"issue":"9","key":"2008_CR9","doi-asserted-by":"publisher","first-page":"5211","DOI":"10.3390\/su14095211","volume":"14","author":"T Guan","year":"2022","unstructured":"Guan T, Han Y, Kang N, Tang N, Chen X, Wang S (2022) An overview of vehicular cybersecurity for intelligent connected vehicles. Sustainability 14(9):5211","journal-title":"Sustainability"},{"key":"2008_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102269","volume":"109","author":"M Pham","year":"2021","unstructured":"Pham M, Xiong K (2021) A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput Sec 109:102269","journal-title":"Comput Sec"},{"key":"2008_CR11","doi-asserted-by":"crossref","unstructured":"Wiecher C (2020) A feature-oriented approach: from usage scenarios to automated system of systems validation in the automotive domain. In: Proceedings of the 23rd ACM\/IEEE international conference on model driven engineering languages and systems: companion proceedings, pp 1\u20136","DOI":"10.1145\/3417990.3419485"},{"issue":"8","key":"2008_CR12","doi-asserted-by":"publisher","first-page":"12328","DOI":"10.1109\/TITS.2021.3113675","volume":"23","author":"G Comert","year":"2021","unstructured":"Comert G, Rahman M, Islam M, Chowdhury M (2021) Change point models for real-time cyber attack detection in connected vehicle environment. IEEE Trans Intell Transport Syst 23(8):12328\u201312342","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"2008_CR13","doi-asserted-by":"publisher","first-page":"44756","DOI":"10.1109\/ACCESS.2022.3168716","volume":"10","author":"N Sun","year":"2022","unstructured":"Sun N, Li C-T, Chan H, Le BD, Islam MZ, Zhang LY, Islam MR, Armstrong W (2022) Defining security requirements with the common criteria: Applications, adoptions, and challenges. IEEE Access 10:44756\u201344777","journal-title":"IEEE Access"},{"key":"2008_CR14","doi-asserted-by":"crossref","unstructured":"Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J (2023) Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutorials","DOI":"10.1109\/COMST.2023.3273282"},{"key":"2008_CR15","doi-asserted-by":"crossref","unstructured":"Zhu Z, Dumitras T (2018) Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports. In: 2018 IEEE European symposium on security and privacy (EuroS &P), IEEE, pp 458\u2013472","DOI":"10.1109\/EuroSP.2018.00039"},{"key":"2008_CR16","doi-asserted-by":"crossref","unstructured":"Dion\u00edsio N, Alves F, Ferreira PM, Bessani A (2019) Cyberthreat detection from twitter using deep neural networks. In: 2019 International joint conference on neural networks (IJCNN), IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8852475"},{"issue":"19","key":"2008_CR17","doi-asserted-by":"publisher","first-page":"3945","DOI":"10.3390\/app9193945","volume":"9","author":"H Gasmi","year":"2019","unstructured":"Gasmi H, Laval J, Bouras A (2019) Information extraction of cybersecurity concepts: An lstm approach. Appl Sci 9(19):3945","journal-title":"Appl Sci"},{"key":"2008_CR18","doi-asserted-by":"publisher","first-page":"8749","DOI":"10.1609\/aaai.v34i05.6401","volume":"34","author":"T Satyapanich","year":"2020","unstructured":"Satyapanich T, Ferraro F, Finin T (2020) Casie: Extracting cybersecurity event information from text. Proceedings of the AAAI conference on artificial intelligence 34:8749\u20138757","journal-title":"Proceedings of the AAAI conference on artificial intelligence"},{"key":"2008_CR19","unstructured":"Zhao J, Yan Q, Liu X, Li B, Zuo G (2020) Cyber threat intelligence modeling based on heterogeneous graph convolutional network. In: 23rd International symposium on research in attacks, intrusions and defenses (RAID 2020), pp 241\u2013256"},{"issue":"2","key":"2008_CR20","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TKDE.2020.2987019","volume":"34","author":"Y Gao","year":"2020","unstructured":"Gao Y, Li X, Peng H, Fang B, Philip SY (2020) Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network. IEEE Trans Knowl Data Eng 34(2):708\u2013722","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2008_CR21","first-page":"80","volume":"41","author":"T Li","year":"2020","unstructured":"Li T, Guo Y, Ju A (2020) Knowledge triple extraction in cybersecurity with adversarial active learning. J Commun 41:80\u201391","journal-title":"J Commun"},{"key":"2008_CR22","doi-asserted-by":"crossref","unstructured":"Zuo J, Gao Y, Li X, Yuan J (2022) An end-to-end entity and relation joint extraction model for cyber threat intelligence. In: 2022 7th International conference on big data analytics (ICBDA), IEEE, pp 204\u2013209","DOI":"10.1109\/ICBDA55095.2022.9760342"},{"key":"2008_CR23","doi-asserted-by":"crossref","unstructured":"Guo Y, Liu Z, Huang C, Liu J, Jing W, Wang Z, Wang Y (2021) Cyberrel: Joint entity and relation extraction for cybersecurity concepts. In: Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I 23, Springer, pp 447\u2013463","DOI":"10.1007\/978-3-030-86890-1_25"},{"key":"2008_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2020.103384","volume":"103","author":"L Luo","year":"2020","unstructured":"Luo L, Yang Z, Cao M, Wang L, Zhang Y, Lin H (2020) A neural network-based joint learning approach for biomedical entity and relation extraction from biomedical literature. J Biomed Inf 103:103384","journal-title":"J Biomed Inf"},{"key":"2008_CR25","doi-asserted-by":"crossref","unstructured":"Shaaban AM, Schmittner C, Gruber T, Mohamed AB, Quirchmayr G, Schikuta E (2019) Ontology-based model for automotive security verification and validation. In: Proceedings of the 21st international conference on information integration and web-based applications & services, pp 73\u201382","DOI":"10.1145\/3366030.3366070"},{"issue":"4","key":"2008_CR26","doi-asserted-by":"publisher","first-page":"401","DOI":"10.26421\/JDI1.4-1","volume":"1","author":"AM Shaaban","year":"2020","unstructured":"Shaaban AM, Schmittner C, Gruber T, Mohamed AB, Quirchmayr G, Schikuta E et al (2020) An automated ontology-based security requirements identification for the vehicular domain. J Data Intell 1(4):401\u2013418","journal-title":"J Data Intell"},{"key":"2008_CR27","doi-asserted-by":"crossref","unstructured":"Hou S, Chen X, Ma J, Zhou Z, Yu H (2022) An ontology-based dynamic attack graph generation approach for the internet of vehicles. Front Energy Res 10:928919","DOI":"10.3389\/fenrg.2022.928919"},{"key":"2008_CR28","doi-asserted-by":"crossref","unstructured":"Grimm D, Sax E (2022) Context-aware vehicle and fleet security combining a knowledge graph and an object-oriented model. In: 2022 International conference on connected vehicle and expo (ICCVE), IEEE, pp 1\u20138","DOI":"10.1109\/ICCVE52871.2022.9742971"},{"key":"2008_CR29","first-page":"23","volume":"2018","author":"RY Venkata","year":"2018","unstructured":"Venkata RY, Kamongi P, Kavi K (2018) An ontology-driven framework for security and resiliency in cyber physical systems. ICSEA 2018:23","journal-title":"ICSEA"},{"key":"2008_CR30","unstructured":"Cappelli MA (2022) A semantic-based artificial intelligence (ai) reasoning tool to analyse the link between cyber security and safety for internet of vehicle (iov) and autonomous vehicles (avs). Ph. D. dissertation"},{"issue":"5","key":"2008_CR31","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s11859-014-1029-x","volume":"19","author":"C Tang","year":"2014","unstructured":"Tang C, Wang L, Tang S, Qiang B, Tian J (2014) Semantic description and verification of security policy based on ontology. Wuhan Univ J Natural Sci 19(5):385\u2013392","journal-title":"Wuhan Univ J Natural Sci"},{"key":"2008_CR32","doi-asserted-by":"crossref","unstructured":"Liu K, Wang F, Ding Z, Liang S, Yu Z, Zhou Y (2022) Recent progress of using knowledge graph for cybersecurity. Electronics 11(15):2287","DOI":"10.3390\/electronics11152287"},{"key":"2008_CR33","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"key":"2008_CR34","doi-asserted-by":"crossref","unstructured":"Qiao X, Tang Y, Liu Y, Su M, Wang C, Fu Y, Li X, Wu M, Fu Q, Zhu D (2022) A event extraction method of document-level based on the self-attention mechanism. In: International conference on machine learning for cyber security, Springer, pp 609\u2013619","DOI":"10.1007\/978-3-031-20099-1_50"},{"issue":"10","key":"2008_CR35","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff K, Srivastava RK, Koutn\u00edk J, Steunebrink BR, Schmidhuber J (2016) Lstm: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222\u20132232","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2008_CR36","doi-asserted-by":"crossref","unstructured":"Zheng S, Wang F, Bao H, Hao Y, Zhou P, Xu B (2017) Joint extraction of entities and relations based on a novel tagging scheme. In: Proceedings of the 55th annual meeting of the association for computational linguistics (Volume 1: Long Papers), pp 1227\u20131236","DOI":"10.18653\/v1\/P17-1113"},{"issue":"4","key":"2008_CR37","doi-asserted-by":"publisher","first-page":"148","DOI":"10.3390\/info10040148","volume":"10","author":"F Sommer","year":"2019","unstructured":"Sommer F, D\u00fcrrwang J, Kriesten R (2019) Survey and classification of automotive security attacks. Information 10(4):148","journal-title":"Information"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02008-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02008-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02008-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:55Z","timestamp":1758986575000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02008-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2008"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02008-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"20 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"227"}}