{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:01:30Z","timestamp":1762300890329,"version":"3.40.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-025-00782-y","type":"journal-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T09:39:50Z","timestamp":1746005990000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing Automotive Networks from DoS and Fuzzy Attacks with Optimized LSTM Models"],"prefix":"10.1007","volume":"18","author":[{"given":"W. Beniel","family":"Dennyson","sequence":"first","affiliation":[]},{"given":"C.","family":"Jothikumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"issue":"6","key":"782_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MDAT.2019.2899062","volume":"36","author":"C Young","year":"2019","unstructured":"Young, C., Zambreno, J., Olufowobi, H., Bloom, G.: Survey of automotive controller area network intrusion detection systems. IEEE Des. Test 36(6), 48\u201355 (2019)","journal-title":"IEEE Des. Test"},{"issue":"3","key":"782_CR2","doi-asserted-by":"publisher","DOI":"10.1115\/1.4052823","volume":"8","author":"M Lombardi","year":"2022","unstructured":"Lombardi, M., Pascale, F., Santaniello, D.: Two-step algorithm to detect cyber-attack over the can-bus: a preliminary case study in connected vehicles. ASCE-ASME J. Risk Uncertain. Eng. Syst., Part B: Mech. Eng. 8(3), 031105 (2022)","journal-title":"ASCE-ASME J. Risk Uncertain. Eng. Syst., Part B: Mech. Eng."},{"issue":"4","key":"782_CR3","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.dcan.2020.04.007","volume":"6","author":"M Dibaei","year":"2020","unstructured":"Dibaei, M., Zheng, Xi., Jiang, K., Abbas, R., Liu, S., Zhang, Y., Xiang, Y., Shui, Yu.: Attacks and defences on intelligent connected vehicles: a survey. Digit. Commun. Netw. 6(4), 399\u2013421 (2020)","journal-title":"Digit. Commun. Netw."},{"key":"782_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150","volume":"103","author":"K Kim","year":"2021","unstructured":"Kim, K., Kim, J.S., Jeong, S., Park, J.-H., Kim, H.K.: Cybersecurity for autonomous vehicles: review of attacks and defense. Comput. Secur.. Secur. 103, 102150 (2021)","journal-title":"Comput. Secur.. Secur."},{"key":"782_CR5","doi-asserted-by":"publisher","first-page":"4133","DOI":"10.1109\/TIFS.2021.3098162","volume":"16","author":"M Jedh","year":"2021","unstructured":"Jedh, M., Othmane, L.B., Ahmed, N., Bhargava, B.: Detection of message injection attacks onto the can bus using similarities of successive messages-sequence graphs. IEEE Trans. Inf. Forensics Secur.Secur. 16, 4133\u20134146 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur.Secur."},{"issue":"3","key":"782_CR6","doi-asserted-by":"publisher","first-page":"2124","DOI":"10.1109\/JIOT.2021.3090397","volume":"9","author":"Y Xun","year":"2021","unstructured":"Xun, Y., Zhao, Y., Liu, J.: VehicleEIDS: a novel external intrusion detection system based on vehicle voltage signals. IEEE Internet Things J. 9(3), 2124\u20132133 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"782_CR7","doi-asserted-by":"publisher","first-page":"3554","DOI":"10.3390\/s23073554","volume":"23","author":"J Khan","year":"2023","unstructured":"Khan, J., Lim, D.-W., Kim, Y.-S.: Intrusion detection system can-bus in-vehicle networks based on the statistical characteristics of attacks. Sensors 23(7), 3554 (2023)","journal-title":"Sensors"},{"key":"782_CR8","volume":"46","author":"M Sadaf","year":"2024","unstructured":"Sadaf, M., Iqbal, Z., Anwar, Z., Noor, U., Imran, M., Gadekallu, T.R.: A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic. Veh. Commun. 46, 100741 (2024)","journal-title":"Veh. Commun."},{"key":"782_CR9","doi-asserted-by":"crossref","unstructured":"Li, D., Tian, M., Jiang, R., Yang, Ke.: Exploiting temperature-varied voltage fingerprints for in-vehicle CAN intrusion detection. In\u00a0Proceedings of the ACM Turing Award Celebration Conference-China, pp. 116\u2013120 (2021)","DOI":"10.1145\/3472634.3472662"},{"key":"782_CR10","unstructured":"Devnath, M. K.: GCNIDS: graph convolutional network-based intrusion detection system for CAN bus (2023)"},{"issue":"1","key":"782_CR11","doi-asserted-by":"publisher","first-page":"360","DOI":"10.3390\/s22010360","volume":"22","author":"TH Aldhyani","year":"2022","unstructured":"Aldhyani, T.H., Alkahtani, H.: Attacks to automatous vehicles: a deep learning algorithm for cybersecurity. Sensors 22(1), 360 (2022)","journal-title":"Sensors"},{"key":"782_CR12","doi-asserted-by":"crossref","unstructured":"Cerracchio, P., Longari, S., Carminati, M., Zanero, S.: Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems. In\u00a0Symposium on Vehicles Security and Privacy (VehicleSec) 2024 (2024).","DOI":"10.14722\/vehiclesec.2024.23056"},{"issue":"2","key":"782_CR13","first-page":"119","volume":"5","author":"N Kabilan","year":"2024","unstructured":"Kabilan, N., Ravi, V., Sowmya, V.: Unsupervised intrusion detection system for in-vehicle communication networks. J. Saf. Sci. Resil. 5(2), 119\u2013129 (2024)","journal-title":"J. Saf. Sci. Resil."},{"key":"782_CR14","doi-asserted-by":"publisher","first-page":"185489","DOI":"10.1109\/ACCESS.2020.3029307","volume":"8","author":"MD Hossain","year":"2020","unstructured":"Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: LSTM-based intrusion detection system for in-vehicle can bus communications. IEEE Access 8, 185489\u2013185502 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"782_CR15","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s40031-023-00987-9","volume":"105","author":"CR Kishore","year":"2024","unstructured":"Kishore, C.R., Chandrasekhar-Rao, D., Nayak, J., Behera, H.S.: Intelligent intrusion detection framework for anomaly-based CAN bus network using bidirectional long short-term memory. J. Inst. Eng. (India) Ser. B 105(3), 541\u2013564 (2024)","journal-title":"J. Inst. Eng. (India) Ser. B"},{"issue":"9","key":"782_CR16","doi-asserted-by":"publisher","first-page":"12579","DOI":"10.1007\/s13369-024-08787-z","volume":"49","author":"N Nabil","year":"2024","unstructured":"Nabil, N., Najib, N., Abdellah, J.: Leveraging artificial neural networks and lightgbm for enhanced intrusion detection in automotive systems. Arab. J. Sci. Eng. 49(9), 12579\u201312587 (2024)","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"782_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s42400-023-00195-4","volume":"7","author":"V Tanksale","year":"2024","unstructured":"Tanksale, V.: Intrusion detection system for controller area network. Cybersecurity 7(1), 4 (2024)","journal-title":"Cybersecurity"},{"issue":"24","key":"782_CR18","doi-asserted-by":"publisher","first-page":"22111","DOI":"10.1109\/JIOT.2023.3303271","volume":"10","author":"MH Shahriar","year":"2023","unstructured":"Shahriar, M.H., Xiao, Y., Moriano, P., Lou, W., Thomas-Hou, Y.: CANShield: deep learning-based intrusion detection framework for controller area networks at the signal-level. IEEE Internet Things J. 10(24), 22111\u201322127 (2023)","journal-title":"IEEE Internet Things J."},{"key":"782_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5827056","author":"H Ma","year":"2022","unstructured":"Ma, H., Cao, J., Mi, B., Huang, D., Liu, Y., Li, S.: A GRU-based lightweight system for CAN intrusion detection in real time. Secur. Commun. Netw. (2022). https:\/\/doi.org\/10.1155\/2022\/5827056","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"782_CR20","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/TNSM.2020.3038991","volume":"18","author":"S Longari","year":"2020","unstructured":"Longari, S., Valcarcel, D.H.N., Zago, M., Carminati, M., Zanero, S.: CANnolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans. Netw. Serv. Manage.Netw. Serv. Manage. 18(2), 1913\u20131924 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage.Netw. Serv. Manage."},{"issue":"8","key":"782_CR21","doi-asserted-by":"publisher","first-page":"5081","DOI":"10.1109\/TITS.2020.3046974","volume":"22","author":"F Amato","year":"2021","unstructured":"Amato, F., Coppolino, L., Mercaldo, F., Moscato, F., Nardone, R., Santone, A.: CAN-bus attack detection with deep learning. IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst. 22(8), 5081\u20135090 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst."},{"key":"782_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100291","volume":"27","author":"H Qin","year":"2021","unstructured":"Qin, H., Yan, M., Ji, H.: Application of controller area network (CAN) bus anomaly detection based on time series prediction. Vehicular Communications 27, 100291 (2021)","journal-title":"Vehicular Communications"},{"issue":"1","key":"782_CR23","doi-asserted-by":"publisher","first-page":"6295","DOI":"10.1038\/s41598-022-10200-4","volume":"12","author":"R Hu","year":"2022","unstructured":"Hu, R., Zhongying, Wu., Yong, Xu., Lai, T.: Multi-attack and multi-classification intrusion detection for vehicle-mounted networks based on mosaic-coded convolutional neural network. Sci. Rep. 12(1), 6295 (2022)","journal-title":"Sci. Rep."},{"issue":"4","key":"782_CR24","first-page":"1","volume":"3","author":"DA Juraev","year":"2024","unstructured":"Juraev, D.A., Israr, M.: Establish intelligent fault detection in electrical power system: evolutionary computation in industrial IoT environments. Int. J. Data Inform. Intell. Comput. 3(4), 1\u20137 (2024)","journal-title":"Int. J. Data Inform. Intell. Comput."},{"issue":"1","key":"782_CR25","first-page":"23","volume":"3","author":"N Kohila","year":"2024","unstructured":"Kohila, N., Ramprabha, T.: Gaussian proximal hough transformative regularized incremental extreme learning machines for palmprint detection. Int. J. Data Inform. Intell. Comput. 3(1), 23\u201335 (2024)","journal-title":"Int. J. Data Inform. Intell. Comput."},{"issue":"2","key":"782_CR26","first-page":"11","volume":"2","author":"VS Kumar","year":"2023","unstructured":"Kumar, V.S.: A big data analytical framework for intrusion detection based on novel elephant herding optimized finite dirichlet mixture models. Int. J. Data Inform. Intell. Comput. 2(2), 11\u201320 (2023)","journal-title":"Int. J. Data Inform. Intell. Comput."},{"issue":"12","key":"782_CR27","doi-asserted-by":"publisher","first-page":"25469","DOI":"10.1109\/TITS.2021.3105834","volume":"23","author":"IA Khan","year":"2021","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Haider, W., Li, B., Jolfaei, A.: An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst. 23(12), 25469\u201325478 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst."},{"key":"782_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103694","volume":"167","author":"IA Khan","year":"2025","unstructured":"Khan, I.A., Keshk, M., Hussain, Y., Pi, D., Li, B., Kousar, T., Ali, B.S.: A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security. Ad Hoc Netw.Netw. 167, 103694 (2025)","journal-title":"Ad Hoc Netw.Netw."},{"issue":"6","key":"782_CR29","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan, I.A., Razzak, I., Pi, D., Zia, U., Kamal, S., Hussain, Y.: A novel collaborative SRU network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J. Biomed. Health Inform. 28(6), 3228\u20133235 (2024)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"782_CR30","unstructured":"https:\/\/ocslab.hksecurity.net\/Datasets\/car-hacking-dataset"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-00782-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-025-00782-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-00782-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T09:39:55Z","timestamp":1746005995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-025-00782-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["782"],"URL":"https:\/\/doi.org\/10.1007\/s44196-025-00782-y","relation":{},"ISSN":["1875-6883"],"issn-type":[{"type":"electronic","value":"1875-6883"}],"subject":[],"published":{"date-parts":[[2025,4,30]]},"assertion":[{"value":"26 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"95"}}