{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:38:11Z","timestamp":1773812291538,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,6]]},"DOI":"10.1145\/3722567.3727848","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T06:20:31Z","timestamp":1745389231000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive Intrusion Mitigation in Software-Defined Vehicles Using Deep Reinforcement Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1270-1213","authenticated-orcid":false,"given":"Harrison","family":"Kurunathan","sequence":"first","affiliation":[{"name":"CISTER-ISEP, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1342-4227","authenticated-orcid":false,"given":"Hazem Ismail","family":"Ali","sequence":"additional","affiliation":[{"name":"CERES, ITE, Halmstad University, Halmstad, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4835-2286","authenticated-orcid":false,"given":"Gowhar","family":"Javanmardi","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6408-5152","authenticated-orcid":false,"given":"Mohamed","family":"Eldefrawy","sequence":"additional","affiliation":[{"name":"CERES, ITE, Halmstad University, Halmstad, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3307-8731","authenticated-orcid":false,"given":"Miguel Guti\u00e9rrez","family":"Gait\u00e1n","sequence":"additional","affiliation":[{"name":"Pontificia Universidad Cat\u00f3lica de Chile, Chile"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1054-1818","authenticated-orcid":false,"given":"Ramiro","family":"Robles","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0473-1559","authenticated-orcid":false,"given":"Patrick","family":"Yomsi","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8979-3876","authenticated-orcid":false,"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"186","article-title":"2024. Worst-case response time of mixed vehicles at complex intersections","volume":"5","author":"Santos M.G.","unstructured":"Reddy, R., Almeida, L., Kurunathan, H., Gait\u00e1n, M.G., Santos, P.M. and Tovar, E., 2024. Worst-case response time of mixed vehicles at complex intersections. in IEEE Open Journal of Intelligent Transportation Systems, 5, pp. 186--201.","journal-title":"IEEE Open Journal of Intelligent Transportation Systems"},{"key":"e_1_3_2_1_2_1","first-page":"464","volume-title":"2023 IEEE 24th Int. Symp. on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","author":"Kurunathan H.","year":"2023","unstructured":"H. Kurunathan, J. Santos, D. Moreira, and P. M. Santos, \"Towards Safe Cooperative Autonomous Platoon Systems Using COTS Equipment,\" in Proc. 2023 IEEE 24th Int. Symp. on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 464--469, 2023."},{"key":"e_1_3_2_1_3_1","first-page":"369","volume-title":"2023 20th Annual IEEE Int. Conf. on Sensing, Communication, and Networking (SECON)","author":"Duarte P.","year":"2023","unstructured":"P. Duarte, M. Soyturk, R. Robles, M. Ara\u00fajo, B. Yaman, A. Goes, B. Mendes, G. Javanmardi, and M. G. Gait\u00e1n, \"5G Network as Key-Enabler for Vehicular Platooning,\" in Proc. 2023 20th Annual IEEE Int. Conf. on Sensing, Communication, and Networking (SECON), pp. 369--371, 2023."},{"key":"e_1_3_2_1_4_1","volume-title":"Software Defined Vehicles for Development of Deterministic Services,\" arXiv e-prints","author":"Teixeira P. Veloso","year":"2024","unstructured":"P. Veloso Teixeira, D. Raposo, R. Lopes, and S. Sargento, \"Software Defined Vehicles for Development of Deterministic Services,\" arXiv e-prints, p. arXiv-2407, 2024."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","author":"Yadav K.","year":"2024","unstructured":"K. Yadav, S. Shinde, V. Chebrolu, A. Kumar, V. Ramakrishna, and P. Rajalakshmi, \"Design Considerations and Framework Analysis for Software-Defined Autonomous Vehicles,\" in Proc. 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring), pp. 1--5, 2024."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10437-z"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC61514.2024.10592471"},{"key":"e_1_3_2_1_8_1","volume-title":"Intrusion Detection in Industrial Control Systems Based on Deep Reinforcement Learning,\" IEEE Access","author":"Sangoleye F.","year":"2024","unstructured":"F. Sangoleye, J. Johnson, and E. E. Tsiropoulou, \"Intrusion Detection in Industrial Control Systems Based on Deep Reinforcement Learning,\" IEEE Access, 2024."},{"key":"e_1_3_2_1_9_1","volume-title":"Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape through Systematic Literature Review,\" IEEE Access","author":"Gularte K. H. M.","year":"2024","unstructured":"K. H. M. Gularte, J. A. R. Vargas, J. P.J. Da Costa, A. A. S. Da Silva, G. A. Santos, Y. Wang, C. A. M\u00fcller, C. Lipps, R. T. S. J\u00fanior, W.B.Vidal Filho, et al., \"Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape through Systematic Literature Review,\" IEEE Access, 2024."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3659575"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"H. Liao M. Z. Murah M. K. Hasan A. H. M. Aman J. Fang X. Hu and A. U. R. Khan \"A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things \" IEEE Access 2024.","DOI":"10.1109\/ACCESS.2023.3349287"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3166864"},{"key":"e_1_3_2_1_13_1","volume-title":"Privacy-Preserving Intrusion Detection in Software-Defined VANET Using Federated Learning with BERT,\" arXiv preprint arXiv:2401.07343","author":"Ahsan S. I.","year":"2024","unstructured":"S. I. Ahsan, P. Legg, and S. M. Alam, \"Privacy-Preserving Intrusion Detection in Software-Defined VANET Using Federated Learning with BERT,\" arXiv preprint arXiv:2401.07343, 2024."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3537800"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3410534"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-73932-5"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"33","article-title":"Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation","volume":"4","author":"Asaju B. J.","year":"2024","unstructured":"B. J. Asaju, \"Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation,\" Journal of Computational Intelligence and Robotics, vol. 4, no. 1, pp. 33--50, 2024.","journal-title":"Journal of Computational Intelligence and Robotics"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00821-3"},{"key":"e_1_3_2_1_19_1","volume-title":"Distributed and Network-Based Processing (PDP)","author":"Balte W.","year":"2025","unstructured":"W. Balte, J. Rendal, H. Kurunathan, H. I. Ali, A. dos Santos Roque, W. de Morais and M. Fazeli, \"ZeroCAN: Anomaly-Based Zero-Day Attack Detection in Vehicular CAN Bus Networks,\" 2025 33rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Turin, Italy, 2025."},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Proc. 19th Int. Conf. on Availability, Reliability and Security","author":"Lekidis A.","year":"2024","unstructured":"A. Lekidis, \"Anomaly Detection Mechanisms for In-Vehicle and V2X Systems,\" in Proc. 19th Int. Conf. on Availability, Reliability and Security, pp. 1--8, 2024."},{"key":"e_1_3_2_1_21_1","first-page":"1137","volume-title":"ICC 2023 - IEEE Int. Conf. on Communications","author":"Korba A. A.","year":"2023","unstructured":"A. A. Korba, A. Boualouache, B. Brik, R. Rahal, Y. Ghamri-Doudane, and S. M. Senouci, \"Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks,\" in Proc. ICC 2023 - IEEE Int. Conf. on Communications, pp. 1137--1142, 2023."}],"event":{"name":"SenSys '25: The 23rd ACM Conference on Embedded Networked Sensor Systems","location":"Irvine CA USA","acronym":"SenSys '25","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 4th International Workshop on Real-time and IntelliGent Edge computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722567.3727848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3722567.3727848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:44:47Z","timestamp":1755974687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722567.3727848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":21,"alternative-id":["10.1145\/3722567.3727848","10.1145\/3722567"],"URL":"https:\/\/doi.org\/10.1145\/3722567.3727848","relation":{},"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2025-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}