{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:07Z","timestamp":1767339487477,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.23919\/ifipnetworking57963.2023.10186390","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:38:31Z","timestamp":1690220311000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["An Enhanced Model for Machine Learning-Based DoS Detection in Vehicular Networks"],"prefix":"10.23919","author":[{"given":"Secil","family":"Ercan","sequence":"first","affiliation":[{"name":"Universit&#x00E9; Gustave Eiffel,COSYS-ERENA Lab,Talence,France,33400"}]},{"given":"Leo","family":"Mendiboure","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Gustave Eiffel,COSYS-ERENA Lab,Talence,France,33400"}]},{"given":"Lylia","family":"Alouache","sequence":"additional","affiliation":[{"name":"ETIS UMR8051, CY Cergy Paris University, ENSEA, CNRS,Cergy,France,F-95000"}]},{"given":"Sassi","family":"Maaloul","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Gustave Eiffel,COSYS-ERENA Lab,Talence,France,33400"}]},{"given":"Tidiane","family":"Sylla","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Gustave Eiffel,COSYS-ERENA Lab,Talence,France,33400"}]},{"given":"Hasnaa","family":"Aniss","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Gustave Eiffel,COSYS-ERENA Lab,Talence,France,33400"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100403"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/info9070149"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020219"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets48225.2019.9069788"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635701"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2015.61"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IDEA49133.2020.9170675"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120626"},{"key":"ref33","first-page":"1433","article-title":"A stacked ensemble learning model for intrusion detection in wireless network","author":"rajadurai","year":"2020","journal-title":"Neural Computing and Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048198"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2018.2803259"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6979970"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s22249570"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon42311.2019.9020468"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_3"},{"key":"ref16","first-page":"656","article-title":"Intrusion detection using machine learning and deep learning techniques","author":"\u00e7al???r","year":"0","journal-title":"2019 4th International Conference on Computer Science and Engineering (UBMK)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2013.6729767"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101188"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI50826.2021.9402441"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12139"},{"key":"ref23","first-page":"2453","article-title":"An attacks detection mechanism for intelligent transport system","author":"valentini","year":"0","journal-title":"2020 IEEE International Conference on Big Data (Big Data)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2014.05.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813790"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC54071.2022.9722661"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102961"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777191"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2013.6508250"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC52330.2021.9640911"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500411"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106904"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: techniques, datasets and challenges","volume":"2","author":"khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V28P204"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"6038","DOI":"10.1051\/matecconf\/201815006038","article-title":"Classification of security attacks in vanet: A review of requirements and perspectives","volume":"150","author":"junaid","year":"0","journal-title":"MATEC Web of Conferences"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808444"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6142-6_7"}],"event":{"name":"2023 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2023,6,12]]},"location":"Barcelona, Spain","end":{"date-parts":[[2023,6,15]]}},"container-title":["2023 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10186376\/10186354\/10186390.pdf?arnumber=10186390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:02:19Z","timestamp":1702321339000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10186390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":42,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking57963.2023.10186390","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]}}}