{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:46:48Z","timestamp":1775069208938,"version":"3.50.1"},"reference-count":254,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tits.2025.3558849","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T13:06:20Z","timestamp":1748005580000},"page":"11137-11205","source":"Crossref","is-referenced-by-count":31,"title":["Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-8664","authenticated-orcid":false,"given":"Shimaa A.","family":"Abdel Hakeem","sequence":"first","affiliation":[{"name":"Department of Electronics Engineering, College of Electrical and Computer Engineering, Chungbuk National University, Cheongju, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.2987430"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2999885"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00704-7"},{"key":"ref5","article-title":"Intelligent physical layer security approach for V2X communication","author":"Furqan","year":"2019","journal-title":"arXiv:1905.05075"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107093"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00029"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3657647"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/globecom48099.2022.10001675"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108149"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s23084086"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2022-spring54318.2022.9860373"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100827"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323406"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2307888.2307902"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228654"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.10"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23222"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2018.2801622"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9997771"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2966160"},{"issue":"3","key":"ref22","first-page":"399","article-title":"Timestamp-based detection of Sybil attack in VANET","volume":"22","author":"Faisal","year":"2020","journal-title":"Int. J. Netw. Secur."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4137"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105696"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICABCD.2018.8465130"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO51393.2021.9596141"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6698099"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2262176"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2907692"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2658662"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2898898"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2927979"},{"key":"ref36","volume-title":"Detecting misbehavior in vehicle-to-vehicle communications","author":"Naserian","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3129079"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.04.007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12778"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3402946"},{"key":"ref42","article-title":"Systematic review: Anomaly detection in connected and autonomous vehicles","author":"Solaas","year":"2024","journal-title":"arXiv:2405.02731"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3236448"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01508-7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3239115"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500383"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769454"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT48472.2019.8970942"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872122"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2962338"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989870"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2423915"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891073"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3541035"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s42154-024-00310-2"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.5772\/55492"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700015"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72329-7_1"},{"key":"ref64","article-title":"National security credential management system (SCMS) deployment support: SCMS baseline summary report","author":"Kolleda","year":"2018"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690778"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s22010331"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.240"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101638"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.009"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00033"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1117\/12.2679253"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288287"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/VNC57357.2023.10136349"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob55322.2022.9941683"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/s20216137"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900662"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937182"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271768"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8868355"},{"key":"ref81","article-title":"Denial-of-Service attacks on C-V2X networks","author":"Trkulja","year":"2020","journal-title":"arXiv:2010.13725"},{"key":"ref82","volume-title":"IDS Intrusion CSV","year":"2025"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI53070.2021.9668440"},{"key":"ref84","article-title":"A brief summary of cybersecurity attacks in V2X communicationm","author":"Mazher","year":"2022"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02419-8"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/202439201097"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110072"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.008"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3390\/s21175838"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/s22051969"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647864"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/hst47167.2019.9032989"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/icc51166.2024.10622762"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ojits.2024.3391830"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/icict60155.2024.10544606"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03437-z"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3292124"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3466511"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3227676"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.03.019"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.4236\/wet.2018.94007"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071072"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT54235.2021.9631589"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3309864"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3197446"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3137790"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3570954"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.3390\/s23218788"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116612"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/iCoMET57998.2023.10099152"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1444-5"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102861"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.59"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391162"},{"key":"ref119","article-title":"Feature extraction for machine learning-based intrusion detection in IoT networks","author":"Sarhan","year":"2021","journal-title":"arXiv:2108.12722"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1757\/1\/012149"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.008"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.04.003"},{"key":"ref125","article-title":"Explaining network intrusion detection system using explainable AI framework","author":"Mane","year":"2021","journal-title":"arXiv:2103.07110"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.119"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120626"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29280-4_70"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_13"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.006"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2996620"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473606"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2021.3138354"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3136706"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872456"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373868"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICOTEN52080.2021.9493543"},{"key":"ref141","article-title":"CIC-IDS2017 dataset report","author":"Rosay","year":"2022"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2018.8370435"},{"issue":"4","key":"ref143","first-page":"101","article-title":"A novel distributed intrusion detection system for vehicular ad hoc networks","volume":"6","author":"Maglaras","year":"2015","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref144","article-title":"A comprehensive guide to CAN IDS data and introduction of the ROAD dataset","author":"Verma","year":"2020","journal-title":"arXiv:2012.14600"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1177\/15501477211000287"},{"key":"ref146","volume-title":"Veremi Dataset","year":"2025"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07635-1"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3852-0_9"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8797-4_21"},{"key":"ref150","article-title":"ToN_IoT datasets","author":"Moustafa","year":"2019"},{"key":"ref151","volume-title":"Intrusion Detection Evaluation Dataset (CSE-CIC-IDS2018)","year":"2028"},{"key":"ref152","volume-title":"The UNSW-NB15 Dataset","year":"2024"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3102056"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104726"},{"key":"ref156","volume-title":"CAN Dataset for intrusion detection (OTIDS)","year":"2024"},{"key":"ref157","volume-title":"Car-Hacking Dataset","year":"2024"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7849909"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.009"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3247339"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628872"},{"key":"ref162","first-page":"1","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th AISTATS","author":"McMahan"},{"key":"ref163","first-page":"1","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. 3rd MLSys Conf.","author":"Li"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC55140.2022.9922064"},{"key":"ref165","article-title":"FL-DECO-BC: A privacy-preserving, secure, and provenance-preserving Fl framework with blockchain for VANETs","author":"Narkedimilli","year":"2024","journal-title":"arXiv:2407.21141"},{"key":"ref166","article-title":"A V2X-based privacy-preserving federated learning system","author":"Alekszejenko","year":"2024","journal-title":"arXiv:2401.13848"},{"issue":"2","key":"ref167","first-page":"2456","article-title":"Federated learning-based intrusion detection in vehicular networks","volume":"73","author":"Korba","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"ref168","first-page":"6783","article-title":"Privacy-preserving federated learning for autonomous vehicles","volume":"11","author":"Zhou","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref169","article-title":"Federated intrusion detection for V2X networks: Challenges and solutions","volume":"225","author":"Li","year":"2024","journal-title":"Comput. Netw."},{"issue":"1","key":"ref170","first-page":"89","article-title":"An execution & evaluation dual-network FL framework for edge security in IoT","volume":"21","author":"Huang","year":"2024","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"ref171","first-page":"1347","article-title":"SDN-enabled federated learning for secure V2X communication","volume":"23","author":"Raza","year":"2024","journal-title":"IEEE Trans. Mobile Comput."},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103881"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104067"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.3390\/info13080395"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2021.3115032"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2021-fall52928.2021.9625388"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.3390\/s25030856"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.23919\/ecc55457.2022.9838396"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3370869"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2021.3092603"},{"key":"ref181","article-title":"Distributed observer design for tracking platoon of connected and autonomous vehicles","author":"Doostmohammadian","year":"2025","journal-title":"arXiv:2501.18890"},{"issue":"4","key":"ref182","first-page":"3401","article-title":"Edge AI-based real-time intrusion detection for smart vehicles","volume":"25","author":"Samy","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"ref183","first-page":"211","article-title":"MEC-enabled intrusion detection systems for secure V2X networks","volume":"21","author":"Alladi","year":"2024","journal-title":"IEEE Trans. Netw. Service Manage."},{"key":"ref184","first-page":"7456","article-title":"Lightweight federated learning for energy-efficient IoT security","volume":"12","author":"Hasan","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"ref185","first-page":"56","article-title":"Hybrid AI-driven security mechanism for V2X networks","volume":"8","author":"Bangui","year":"2024","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3009998"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/icces63552.2024.10859430"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/percomworkshops48775.2020.9156259"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/mwscas47672.2021.9531858"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/icabcd62167.2024.10645287"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3348409"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/fmec54266.2021.9732548"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3084519"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3467002"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3174548"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-88163-5"},{"issue":"3","key":"ref197","first-page":"312","article-title":"ImageFed: Federated learning for cyberattack detection in autonomous vehicles","volume":"5","author":"Taslimasa","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref198","first-page":"1458","article-title":"Blockchain-enhanced federated learning for secure vehicular networks","volume":"19","author":"Bhavsar","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/3ict53449.2021.9581683"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05893-0"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2492981"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782159"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129472"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091411"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09496-0"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.3390\/math8081311"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100167"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000476"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988854"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5206"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS58521.2023.00031"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.065"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2782751"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910272"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3229329.3229332"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467417"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12130"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3066404"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838796"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3165791"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2021.3058292"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000428"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040768"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.07.013"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.200"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310734"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5069104"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.31.5.051405"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2025.3525505"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP54353.2022.9908023"},{"key":"ref236","first-page":"229","article-title":"An attack detection model for enhancing the security of 5G-enabled vehicle-to-everything (V2X) communication for smart vehicles","volume-title":"Proc. FedCSIS (Commun. Papers)","author":"Rajak"},{"issue":"2","key":"ref237","first-page":"1","article-title":"Deep learning-based cyber attack detection in autonomous vehicle networks","volume":"2","author":"Jim\u00e9nez","year":"2022","journal-title":"J. AI-Assist. Sci. Discovery"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081757"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279368"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.040290"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3249665"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3334257"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3188304"},{"issue":"1","key":"ref244","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1038\/s41597-024-04173-4","article-title":"Vehicle-to-vehicle flooding datasets using MK5 on-board unit devices","volume":"11","author":"Sousa","year":"2024","journal-title":"Sci. Data"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.09.005"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.4271\/12-05-03-0020"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1145\/3416014.3424581"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3386631"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556651"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11183-3"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43605-6_7"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT51360.2021.9595326"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-024-03498-4"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/mits.2024.3519620"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/11121550\/11012728.pdf?arnumber=11012728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:44:54Z","timestamp":1754934294000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11012728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":254,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3558849","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}