{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:16:56Z","timestamp":1774966616095,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001871","name":"FCT - Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00319\/2020"],"award-info":[{"award-number":["UIDB\/00319\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.1109\/icumt54235.2021.9631589","type":"proceedings-article","created":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:08:43Z","timestamp":1639429723000},"page":"50-59","source":"Crossref","is-referenced-by-count":10,"title":["Intelligent Hierarchical Intrusion Detection System for VANETs"],"prefix":"10.1109","author":[{"given":"Fabio","family":"Goncalves","sequence":"first","affiliation":[]},{"given":"Joaquim","family":"Macedo","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Santos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"gon\u00e7alves","year":"2021","journal-title":"V2X Security Threats for Cluser-based Evaluation"},{"key":"ref32","author":"haykin","year":"1994","journal-title":"Neural Networks A Comprehensive Foundation"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-007-9052-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEES.2016.7888070"},{"key":"ref34","first-page":"553","article-title":"The WEKA workbench","author":"frank","year":"2017","journal-title":"Data Mining"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3267129.3267146"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/sec.200"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497798"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E97.D.1719"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2016.7604962"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.12.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883426"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61382-6_14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2011.6098221"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3272036.3272042"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1080754.1080774"},{"key":"ref6","first-page":"6","article-title":"A hierarchical security architecture of VANET","author":"liu","year":"2013","journal-title":"International Conference on Cyberspace Technology (CCT 2013) CCT"},{"key":"ref29","author":"h","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.355"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391111"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.115"},{"key":"ref2","year":"2010"},{"key":"ref9","first-page":"1","article-title":"A Systematic Review on Intelligent Intrusion Detection Systems for VANETs","author":"goncalves","year":"2020","journal-title":"2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2018.2801622"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030041"},{"key":"ref24","article-title":"Synthesizing Datasets with Security Threats for Vehicular Ad-Hoc Networks","author":"gon\u00e7alves","year":"0","journal-title":"IEEE Globecom 2020 2020 IEEE Global Communications Conference (GLOBECOM'2020)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref26","first-page":"414","article-title":"Hybrid Model for Secure Communications and Identity Management in Vehicular Ad Hoc Networks","author":"gon\u00e7alves","year":"0","journal-title":"9th International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT'2017)"},{"key":"ref25","year":"2014"}],"event":{"name":"2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","location":"Brno, Czech Republic","start":{"date-parts":[[2021,10,25]]},"end":{"date-parts":[[2021,10,27]]}},"container-title":["2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631553\/9631559\/09631589.pdf?arnumber=9631589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:08Z","timestamp":1652201648000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icumt54235.2021.9631589","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}