{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T20:32:52Z","timestamp":1775334772072,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04769-0","type":"journal-article","created":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:28:33Z","timestamp":1772022513000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Intrusion Detection and Localization Using Deep Learning Approaches in VANET Environments"],"prefix":"10.1007","volume":"7","author":[{"given":"M.","family":"Vijayakumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2349-3701","authenticated-orcid":false,"given":"Elangovan","family":"Muniyandy","sequence":"additional","affiliation":[]},{"given":"Gayatri","family":"Mirajkar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2422-6162","authenticated-orcid":false,"given":"Krovvidi S. B.","family":"Ambika","sequence":"additional","affiliation":[]},{"given":"S. P. M.","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Venkatesh","sequence":"additional","affiliation":[]},{"given":"R. Mohan","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,25]]},"reference":[{"key":"4769_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11277-020-07994-2","volume":"117","author":"DE Boubiche","year":"2021","unstructured":"Boubiche DE, Athmani S, Boubiche S, Toral-Cruz H. Cybersecurity issues in wireless sensor networks: current challenges and solutions. Wirel Pers Commun. 2021;117:177\u2013213. https:\/\/doi.org\/10.1007\/s11277-020-07994-2.","journal-title":"Wirel Pers Commun"},{"key":"4769_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.4018\/978-1-7998-4063-0.ch004","volume-title":"Artificial intelligence paradigms for smart cyber-physical systems","author":"M Yildirim","year":"2021","unstructured":"Yildirim M. Artificial intelligence-based solutions for cyber security problems. In: Artificial intelligence paradigms for smart cyber-physical systems. IGI Global; 2021. p. 68\u201386. https:\/\/doi.org\/10.4018\/978-1-7998-4063-0.ch004."},{"issue":"3","key":"4769_CR3","first-page":"159","volume":"3","author":"A Mathew","year":"2021","unstructured":"Mathew A. Artificial intelligence for offense and the future of cybersecurity. Educ Res. 2021;3(3):159\u201363.","journal-title":"Educ Res"},{"key":"4769_CR4","unstructured":"Alfurhood BS, Mankame DP, Dwivedi M, Jindal MN. Artificial intelligence and cybersecurity: innovations, threats, and defense strategies. J Adv Zoology. 2023;44(S2):4715\u20134721."},{"key":"4769_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.future.2021.09.006","volume":"127","author":"SK Shandilya","year":"2022","unstructured":"Shandilya SK, Upadhyay S, Kumar A, Nagar AK. AI-assisted computer network operations testbed for nature-inspired cyber security based adaptive defense simulation and analysis. Future Gener Comput Syst. 2022;127:297\u2013308. https:\/\/doi.org\/10.1016\/j.future.2021.09.006.","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"4769_CR6","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.12928\/telkomnika.v19i4.17419","volume":"19","author":"DD Khudhur","year":"2021","unstructured":"Khudhur DD, Croock MS. Physical cyber-security algorithm for wireless sensor networks. TELKOMNIKA Telecommun Comput Electron Control. 2021;19(4):1177\u201384. https:\/\/doi.org\/10.12928\/telkomnika.v19i4.17419.","journal-title":"TELKOMNIKA Telecommun Comput Electron Control"},{"key":"4769_CR7","doi-asserted-by":"publisher","unstructured":"Jilani SA, Koner C, Nandi S. Security in wireless sensor networks: attacks and evasion. In: 2020 Natl Conf Emerg trends sustain technol eng appl (NCETSTEA). IEEE; 2020. pp. 1\u20135. https:\/\/doi.org\/10.1109\/NCETSTEA48365.2020.9119937.","DOI":"10.1109\/NCETSTEA48365.2020.9119937"},{"key":"4769_CR8","doi-asserted-by":"crossref","unstructured":"Naser SM, Ali YH. Study of cyber security effects on wireless sensor networks. Iraqi J Comput Commun Control Syst Eng. 2021;21(4):74-81.","DOI":"10.33103\/uot.ijccce.21.4.7"},{"key":"4769_CR9","doi-asserted-by":"publisher","unstructured":"Salmi S, Oughdir L. CNN-LSTM based approach for DoS attack detection in wireless sensor networks. Int J Adv Comput Sci Appl. 2022. https:\/\/doi.org\/10.14569\/IJACSA.2022.0130487.","DOI":"10.14569\/IJACSA.2022.0130487"},{"issue":"4","key":"4769_CR10","doi-asserted-by":"publisher","first-page":"836","DOI":"10.36418\/edv.v3i4.629","volume":"3","author":"K Komarudin","year":"2023","unstructured":"Komarudin K, Maulani IE, Herdianto T, Laksana MO, Syawaludin DF. Exploring the effectiveness of artificial intelligence in detecting malware and improving cybersecurity in computer networks. Eduvest J Univ Stud. 2023;3(4):836\u201341. https:\/\/doi.org\/10.36418\/edv.v3i4.629.","journal-title":"Eduvest J Univ Stud"},{"issue":"6","key":"4769_CR11","first-page":"3567","volume":"12","author":"PR Chandre","year":"2021","unstructured":"Chandre PR, Mahalle PN, Shinde GR. Intrusion prevention framework for WSN using deep CNN. Turk J Comput Math Educ. 2021;12(6):3567\u201372.","journal-title":"Turk J Comput Math Educ"},{"key":"4769_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3353242","author":"HM Saleh","year":"2024","unstructured":"Saleh HM, Marouane H, Fakhfakh A. Stochastic gradient descent intrusion detection for wireless sensor network attack detection system using machine learning. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3353242.","journal-title":"IEEE Access"},{"issue":"1","key":"4769_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.30564\/ssid.v3i1.3060","volume":"3","author":"A John","year":"2021","unstructured":"John A, Yusuf A, Ardo A. Artificial intelligence technique and wireless sensor networks in energy management system for secure power optimization. Semicond Sci Inf Devices. 2021;3(1):10\u20135.","journal-title":"Semicond Sci Inf Devices"},{"key":"4769_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109469","volume":"220","author":"FG Darbandeh","year":"2023","unstructured":"Darbandeh FG, Safkhani M. SAPWSN: a secure authentication protocol for wireless sensor networks. Comput Netw. 2023;220:109469. https:\/\/doi.org\/10.1016\/j.comnet.2022.109469.","journal-title":"Comput Netw"},{"key":"4769_CR15","doi-asserted-by":"publisher","unstructured":"Chethana C, Pareek PK, de Albuquerque VHC, Khanna A, Gupta D. Deep learning technique-based intrusion detection in cyber-security networks. In: 2022 IEEE 2nd Mysore Sub Section Int Conf (MysuruCon). IEEE; 2022. pp. 1\u20137. https:\/\/doi.org\/10.1109\/MysuruCon55714.2022.10041829","DOI":"10.1109\/MysuruCon55714.2022.10041829"},{"key":"4769_CR16","doi-asserted-by":"publisher","unstructured":"Ismail S, Khoei TT, Marsh R, Kaabouch N. A comparative study of machine learning models for cyber-attack detection in wireless sensor networks. 2021 IEEE 12th annu ubiquitous comput electron mobile commun Conf (UEMCON). IEEE; 2021. pp. 313\u20138. https:\/\/doi.org\/10.1109\/UEMCON53757.2021.9666673.","DOI":"10.1109\/UEMCON53757.2021.9666673"},{"issue":"1","key":"4769_CR17","doi-asserted-by":"publisher","first-page":"012021","DOI":"10.1088\/1742-6596\/1743\/1\/012021","volume":"1743","author":"S Ifzarne","year":"2021","unstructured":"Ifzarne S, Tabbaa H, Hafidi I, Lamghari N. Anomaly detection using machine learning techniques in wireless sensor networks. J Phys Conf Ser. 2021;1743(1):012021. https:\/\/doi.org\/10.1088\/1742-6596\/1743\/1\/012021.","journal-title":"J Phys Conf Ser"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04769-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04769-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04769-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:28:37Z","timestamp":1772022517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04769-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,25]]},"references-count":17,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["4769"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04769-0","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,25]]},"assertion":[{"value":"1 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"234"}}