{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:52:45Z","timestamp":1776181965432,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264479","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Synthetic datasets generation for intrusion detection in VANET"],"prefix":"10.1145","author":[{"given":"Viacheslav","family":"Belenko","sequence":"first","affiliation":[{"name":"Branch office of LG Electronics Inc. (Korea) in St. Petersburg, St. Petersburg, Russia"}]},{"given":"Vasiliy","family":"Krundyshev","sequence":"additional","affiliation":[{"name":"Peter the Great St. Petersburg Polytechnic University, St. Petersburg, Russia"}]},{"given":"Maxim","family":"Kalinin","sequence":"additional","affiliation":[{"name":"Peter the Great St. Petersburg Polytechnic University, St. Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136825.3136890"},{"issue":"3","key":"e_1_3_2_1_2_1","article-title":"Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network","volume":"2","author":"Bhattacharjee P.","year":"2010","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceeding of the Second Annual Conference on Communication Networks and Services Research, 19--21","author":"Lei J. Z.","year":"2004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2016.7561088"},{"issue":"2","key":"e_1_3_2_1_5_1","article-title":"A Survey on VANET Intrusion Detection Systems. In Proceedings of the 2013 International Conference on Systems, Control, Signal Processing and Informatics","volume":"5","author":"Erritali M.","year":"2013","journal-title":"International Journal of Engineering and Technology (IJET)"},{"key":"e_1_3_2_1_6_1","volume-title":"International Journal of Science and Research (IJSR)","volume":"5","author":"Kaur G.","year":"2016"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Zamani and M. Movahedi. 2013. Machine Learning Techniques for Intrusion Detection. CoRR vol. abs\/1312.2177 2013.  M. Zamani and M. Movahedi. 2013. Machine Learning Techniques for Intrusion Detection. CoRR vol. abs\/1312.2177 2013."},{"key":"e_1_3_2_1_8_1","volume-title":"Evaluation of Machine Learning Algorithms for Intrusion Detection System. Intelligent Systems and Informatics (SISY)","author":"Almseidin M.","year":"2017"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceeding of the World Congress on Engineering and Computer Science","volume":"1","author":"Olusola A.","year":"2010"},{"key":"e_1_3_2_1_10_1","unstructured":"DARPA intrusion detection evaluation. June 2018. http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/data index.html  DARPA intrusion detection evaluation. June 2018. http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/data index.html"},{"key":"e_1_3_2_1_11_1","unstructured":"KDD Cup 1999. June 2018. Retrieved from http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html.  KDD Cup 1999. June 2018. Retrieved from http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Te-Shun Chou. 2007. Ensemble Fuzzy Belief Intrusion Detection Design. Florida International University.  Te-Shun Chou. 2007. Ensemble Fuzzy Belief Intrusion Detection Design. Florida International University.","DOI":"10.1109\/IIHMSP.2007.4457786"},{"key":"e_1_3_2_1_13_1","unstructured":"Intrusion detection evaluation dataset (ISCXIDS2012). June 2018. Retrieved from http:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html  Intrusion detection evaluation dataset (ISCXIDS2012). June 2018. Retrieved from http:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html"},{"key":"e_1_3_2_1_14_1","volume-title":"2014 International Symposium on Biometrics and Security Technologies (ISBAST), 232--237","author":"Yassin W."},{"key":"e_1_3_2_1_15_1","unstructured":"LBNL dataset. June 2018. Retrieved from http:\/\/powerdata.lbl.gov\/download.html  LBNL dataset. June 2018. Retrieved from http:\/\/powerdata.lbl.gov\/download.html"},{"key":"e_1_3_2_1_16_1","unstructured":"CAIDA dataset. June 2018. Retrieved from https:\/\/www.caida.org\/data\/  CAIDA dataset. June 2018. Retrieved from https:\/\/www.caida.org\/data\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"R. van der Heijden T. Lukaseder and F. Kargl. 2018. VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. arXiv preprint arXiv:1804.06701.  R. van der Heijden T. Lukaseder and F. Kargl. 2018. VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. arXiv preprint arXiv:1804.06701.","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"e_1_3_2_1_18_1","unstructured":"NS-3. June 2018. Open source network simulator. Retrieved from https:\/\/www.nsnam.org\/.  NS-3. June 2018. Open source network simulator. Retrieved from https:\/\/www.nsnam.org\/."}],"event":{"name":"SIN '18: 11th International Conference On Security Of Information and Networks","location":"Cardiff United Kingdom","acronym":"SIN '18","sponsor":["Cardiff University Cardiff University"]},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264479","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":18,"alternative-id":["10.1145\/3264437.3264479","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264479","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}