{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:32Z","timestamp":1773615752767,"version":"3.50.1"},"reference-count":37,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700986","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:47Z","timestamp":1741962167000},"page":"1318-1325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes"],"prefix":"10.3103","volume":"58","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Pakhomov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7797_CR1","doi-asserted-by":"publisher","unstructured":"Rasheed, A., Gillani, S., Ajmal, S., and Qayyum, A., Vehicular ad hoc network (VANET): A survey, challenges, and applications, Vehicular Ad-Hoc Networks for Smart Cities, Laouiti, A., Qayyum, A., and Mohamad Saad, M., Eds., Advances in Intelligent Systems and Computing, vol. 548, Singapore: Springer, 2016, pp. 39\u201351. https:\/\/doi.org\/10.1007\/978-981-10-3503-6_4","DOI":"10.1007\/978-981-10-3503-6_4"},{"key":"7797_CR2","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.3390\/s22051897","volume":"22","author":"A. Malik","year":"2022","unstructured":"Malik, A., Khan, M.Z., Faisal, M., Khan, F., and Seo, J.-T., An efficient dynamic solution for the detection and prevention of black hole attack in VANETs, Sensors, 2022, vol. 22, no. 5, p. 1897. https:\/\/doi.org\/10.3390\/s22051897","journal-title":"Sensors"},{"key":"7797_CR3","doi-asserted-by":"publisher","first-page":"158481","DOI":"10.1109\/access.2019.2945682","volume":"7","author":"M. Poongodi","year":"2019","unstructured":"Poongodi, M., Vijayakumar, V., Al-Turjman, F., Hamdi, M., and Ma, M., Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics, IEEE Access, 2019, vol.\u00a07, pp. 158481\u2013158491. https:\/\/doi.org\/10.1109\/access.2019.2945682","journal-title":"IEEE Access"},{"key":"7797_CR4","doi-asserted-by":"publisher","first-page":"4954","DOI":"10.3390\/s19224954","volume":"19","author":"A.Sh. Khan","year":"2019","unstructured":"Khan, A.Sh., Balan, K., Javed, Ya., Tarmizi, S., and Abdullah, J., Secure trust-based blockchain architecture to prevent attacks in VANET, Sensors, 2019, vol. 19, no. 22, p. 4954. https:\/\/doi.org\/10.3390\/s19224954","journal-title":"Sensors"},{"key":"7797_CR5","doi-asserted-by":"publisher","unstructured":"Lalli, M. and Graphy, G.S., Prediction based dual authentication model for VANET, 2017 International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2017, IEEE, 2017, pp. 693\u2013699. https:\/\/doi.org\/10.1109\/iccmc.2017.8282555","DOI":"10.1109\/iccmc.2017.8282555"},{"key":"7797_CR6","doi-asserted-by":"publisher","first-page":"270","DOI":"10.33581\/1561-4085-2020-23-3-270-279","volume":"23","author":"D.S. Lavrova","year":"2020","unstructured":"Lavrova, D.S. and Zegzhda, D.P., Modification of recursive Kalman filter algorithm for adaptive prediction of cyber resilience for industrial systems, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 3, pp. 270\u2013279. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-3-270-279","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7797_CR7","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3103\/s0146411617080090","volume":"51","author":"D.V. Ivanov","year":"2017","unstructured":"Ivanov, D.V., Moskvin, D.A., Myasnikov, A.V., and Suprun, A.F., Applying NFC for automated replication of user data, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 855\u2013859. https:\/\/doi.org\/10.3103\/s0146411617080090","journal-title":"Autom. Control Comput. Sci."},{"key":"7797_CR8","doi-asserted-by":"publisher","unstructured":"Kaur, J., Singh, T., and Lakhwani, K., An enhanced approach for attack detection in VANETs using adaptive neuro-fuzzy system, 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, 2019, IEEE, 2019, pp. 191\u2013197. https:\/\/doi.org\/10.1109\/icactm.2019.8776833","DOI":"10.1109\/icactm.2019.8776833"},{"key":"7797_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.cose.2018.06.008","volume":"78","author":"E.A. Shams","year":"2018","unstructured":"Shams, E.A., Rizaner, A., and Ulusoy, A.H., Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks, Comput. Secur., 2018, vol. 78, pp. 245\u2013254. https:\/\/doi.org\/10.1016\/j.cose.2018.06.008","journal-title":"Comput. Secur."},{"key":"7797_CR10","volume-title":"Introduction to Time Series Analysis and Forecasting","author":"D.C. Montgomery","year":"2015","unstructured":"Montgomery, D.C., Jennings, C.L., and Kulahci, M., Introduction to Time Series Analysis and Forecasting, Hoboken, NJ: Wiley, 2015, 2nd ed."},{"key":"7797_CR11","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1214\/009053606000000830","volume":"34","author":"T.T. Cai","year":"2006","unstructured":"Cai, T.T. and Hall, P., Prediction in functional linear regression, Ann. Stat., 2006, vol. 34, no. 5, pp. 2159\u20132179. https:\/\/doi.org\/10.1214\/009053606000000830","journal-title":"Ann. Stat."},{"key":"7797_CR12","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web of Conferences, 2018, vol. 44, p. 00044. https:\/\/doi.org\/10.1051\/shsconf\/20184400044","DOI":"10.1051\/shsconf\/20184400044"},{"key":"7797_CR13","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1109\/lsp.2020.3021925","volume":"27","author":"Yi. Zhou","year":"2020","unstructured":"Zhou, Yi. and Ding, F., Modeling nonlinear processes using the radial basis function-based state-dependent autoregressive models, IEEE Signal Process. Lett., 2020, vol. 27, pp. 1600\u20131604. https:\/\/doi.org\/10.1109\/lsp.2020.3021925","journal-title":"IEEE Signal Process. Lett."},{"key":"7797_CR14","volume-title":"ARIMA models, Time Series Analysis and Its Applications: With R Examples, Springer Texts in Statistics","author":"R.H. Shumway","year":"2017","unstructured":"Shumway, R.H. and Stoffer, D.S., ARIMA models, Time Series Analysis and Its Applications: With R Examples, Springer Texts in Statistics, Cham: Springer, 2017, 4th ed., pp. 75\u2013163."},{"key":"7797_CR15","doi-asserted-by":"publisher","first-page":"727","DOI":"10.3103\/s0146411615080106","volume":"49","author":"D.S. Lavrova","year":"2015","unstructured":"Lavrova, D.S. and Pechenkin, A.I., Adaptive reflexivity threat protection, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 727\u2013734. https:\/\/doi.org\/10.3103\/s0146411615080106","journal-title":"Autom. Control Comput. Sci."},{"key":"7797_CR16","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.asoc.2017.01.015","volume":"54","author":"X. Qiu","year":"2017","unstructured":"Qiu, X., Ren, Ye., Suganthan, P.N., and Amaratunga, G.A.J., Empirical mode decomposition based ensemble deep learning for load demand time series forecasting, Appl. Soft Comput., 2017, vol. 54, pp. 246\u2013255. https:\/\/doi.org\/10.1016\/j.asoc.2017.01.015","journal-title":"Appl. Soft Comput."},{"key":"7797_CR17","doi-asserted-by":"publisher","unstructured":"Lim, B. and Zohren, S., Time-series forecasting with deep learning: A survey, Philos. Trans. R. Soc., A, 2021, vol.\u00a0379, no. 2194, p. 20200209. https:\/\/doi.org\/10.1098\/rsta.2020.0209","DOI":"10.1098\/rsta.2020.0209"},{"key":"7797_CR18","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1111\/joes.12429","volume":"37","author":"R.P. Masini","year":"2023","unstructured":"Masini, R.P., Medeiros, M.C., and Mendes, E.F., Machine learning advances for time series forecasting, J.\u00a0Econ. Surv., 2023, vol. 37, no. 1, pp. 76\u2013111. https:\/\/doi.org\/10.1111\/joes.12429","journal-title":"J.\u00a0Econ. Surv."},{"key":"7797_CR19","doi-asserted-by":"publisher","unstructured":"Siami-Namini, S., Tavakoli, N., and Siami Namin, A., A comparison of ARIMA and LSTM in forecasting time series, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, FL, 2018, IEEE, 2018, pp. 1394\u20131401. https:\/\/doi.org\/10.1109\/icmla.2018.00227","DOI":"10.1109\/icmla.2018.00227"},{"key":"7797_CR20","doi-asserted-by":"publisher","first-page":"83105","DOI":"10.1109\/access.2021.3085085","volume":"9","author":"R. Chandra","year":"2021","unstructured":"Chandra, R., Goyal, Sh., and Gupta, R., Evaluation of deep learning models for multi-step ahead time series prediction, IEEE Access, 2021, vol. 9, pp. 83105\u201383123. https:\/\/doi.org\/10.1109\/access.2021.3085085","journal-title":"IEEE Access"},{"key":"7797_CR21","doi-asserted-by":"publisher","unstructured":"Siami-Namini, S., Tavakoli, N., and Namin, A.S., The performance of LSTM and BiLSTM in forecasting time series, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, 2019, IEEE, 2019, pp. 3285\u20133292. https:\/\/doi.org\/10.1109\/bigdata47090.2019.9005997","DOI":"10.1109\/bigdata47090.2019.9005997"},{"key":"7797_CR22","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Detection and prediction of safety faults in inter-device networks applying a set of data-driven methods, Proceedings of International Scientific Conference on Telecommunications, Computing and Control, Voinov, N., Schreck, T., and Khan, S., Eds., Smart Innovation, Systems and Technologies, vol. 220, Singapore: Springer, 2021, pp. 15\u201325. https:\/\/doi.org\/10.1007\/978-981-33-6632-9_2","DOI":"10.1007\/978-981-33-6632-9_2"},{"key":"7797_CR23","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Kalinin, M., Krundyshev, V., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 1st IEEE International Conference on Industrial Cyber-Physical Systems, St. Petersburg: IEEE, 2018, pp. 795\u2013800. https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390808","DOI":"10.1109\/ICPHYS.2018.8390808"},{"key":"7797_CR24","doi-asserted-by":"publisher","unstructured":"Busygin, A., Kalinin, M., and Konoplev, A., Supporting connectivity of VANET\/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block, SHS Web of Conferences, 2018, vol. 44, p. 00020. https:\/\/doi.org\/10.1051\/shsconf\/20184400020","DOI":"10.1051\/shsconf\/20184400020"},{"key":"7797_CR25","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web of Conferences, 2018, vol. 44, p. 00044. https:\/\/doi.org\/10.1051\/shsconf\/20184400044","DOI":"10.1051\/shsconf\/20184400044"},{"key":"7797_CR26","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Batumi, Georgia, 2018, IEEE, 2018. https:\/\/doi.org\/10.1109\/blackseacom.2018.8433628","DOI":"10.1109\/blackseacom.2018.8433628"},{"key":"7797_CR27","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference (RusAutoCon), Sochi, Krasnodar krai, 2018, IEEE, 2018. https:\/\/doi.org\/10.1109\/rusautocon.2018.8501783","DOI":"10.1109\/rusautocon.2018.8501783"},{"key":"7797_CR28","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, Cardiff, United Kingdom, 2018, ACM International Conference Proceeding Series, New York: Association for Computing Machinery, 2018, p. 9. https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7797_CR29","doi-asserted-by":"publisher","unstructured":"Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, Proceedings of the 11th International Conference on Security of Information and Networks, Cardiff, United Kingdom, 2018, ACM International Conference Proceeding Series, New York: Association for Computing Machinery, 2018. https:\/\/doi.org\/10.1145\/3264437.3264463","DOI":"10.1145\/3264437.3264463"},{"key":"7797_CR30","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/s0146411618080199","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954\u2013958. https:\/\/doi.org\/10.3103\/s0146411618080199","journal-title":"Autom. Control Comput. Sci."},{"key":"7797_CR31","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/s0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976. https:\/\/doi.org\/10.3103\/s0146411618080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7797_CR32","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/s0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0977\u2013983. https:\/\/doi.org\/10.3103\/s0146411618080163","journal-title":"Autom. Control Comput. Sci."},{"key":"7797_CR33","unstructured":"Wetschoreck, F., RIP correlation. introducing the predictive power score, Towards Data Science, 2020. https:\/\/towardsdatascience.com\/rip-correlation-introducing-the-predictive-power-score-3d90808b9598. Cited January 23, 2024."},{"key":"7797_CR34","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1007\/s11277-020-07549-y","volume":"114","author":"K. Adhikary","year":"2020","unstructured":"Adhikary, K., Bhushan, Sh., Kumar, S., and Dutta, K., Hybrid algorithm to detect DDoS attacks in VANETs, Wireless Pers. Commun., 2020, vol. 114, no. 4, pp. 3613\u20133634. https:\/\/doi.org\/10.1007\/s11277-020-07549-y","journal-title":"Wireless Pers. Commun."},{"key":"7797_CR35","first-page":"909","volume":"68","author":"M. Kalinin","year":"2015","unstructured":"Kalinin, M., Lavrova, D., and Pechenkin, A., High performance traffic processing in virtualized framework, Proceedings of the Bulgarian Academy of Sciences, 2015, vol. 68, no. 7, pp. 909\u2013916.","journal-title":"Proceedings of the Bulgarian Academy of Sciences"},{"key":"7797_CR36","doi-asserted-by":"publisher","first-page":"6113","DOI":"10.1007\/s12652-021-02963-x","volume":"14","author":"A. Alsarhan","year":"2023","unstructured":"Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A.-R., and Al-Dubai, A., Machine learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks, Journal of Ambient Intelligence and Humanized Computing, 2023, vol. 14, no. 5, pp. 6113\u20136122. https:\/\/doi.org\/10.1007\/s12652-021-02963-x","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"7797_CR37","doi-asserted-by":"publisher","unstructured":"Singh, P.K., Gupta, R.R., Nandi, S.K., and Nandi, S., Machine learning based approach to detect wormhole attack in VANETs, Web, Artificial Intelligence and Network Applications. WAINA 2019, Barolli, L., Takizawa, M., Xhafa, F., and Enokido, T., Eds., Advances in Intelligent Systems and Computing, vol. 927, Cham: Springer, 2019, pp. 651\u2013661. https:\/\/doi.org\/10.1007\/978-3-030-15035-8_63","DOI":"10.1007\/978-3-030-15035-8_63"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700986.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700986","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700986.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:06Z","timestamp":1773612246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":37,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7797"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700986","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"8 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}