{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:57:02Z","timestamp":1771613822160,"version":"3.50.1"},"reference-count":23,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067733","type":"journal-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T09:00:15Z","timestamp":1758618015000},"page":"4705-4727","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":4,"title":["Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication"],"prefix":"10.32604","volume":"85","author":[{"given":"Bappa","family":"Muktar","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Fono","sequence":"additional","affiliation":[]},{"given":"Adama","family":"Nouboukpo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10922-024-09853-5","article-title":"A comprehensive review of recent developments in vanet for traffic, safety & remote monitoring applications","volume":"32","author":"Dutta","year":"2024","journal-title":"J Netw Syst Manag"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"183937","DOI":"10.1109\/ACCESS.2024.3506815","article-title":"Intelligent transportation system with 5G vehicle-to-everything (V2X): architectures, vehicular use cases, emergency vehicles, current challenges, and future directions","volume":"12","author":"Pawar","year":"2024","journal-title":"IEEE Access"},{"key":"ref3","series-title":"25th International Arab Conference on Information Technology (ACIT); 2024 Dec 10\u201312","first-page":"1","article-title":"A comprehensive review of VANET attacks: predictive models, vulnerability management, and defense selection","author":"Al-Mohtaseb","year":"2024"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"10501","DOI":"10.3390\/app142210501","article-title":"Hybrid AI-powered real-time DDoS detection and traffic monitoring for software-defined-based vehicular ad hoc networks: a new paradigm for securing intelligent transportation networks","volume":"14","author":"Polat","year":"2024","journal-title":"Appl Sci"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"Ababsa M, Ribouh S, Malki A, Khoukhi L. Deep multimodal learning for real-time DDoS attacks detection in internet of vehicles. arXiv:2501.15252. 2025.","DOI":"10.1109\/ICC52391.2025.11160909"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1186\/s13638-025-02465-w","article-title":"Enhancing the reliability and accuracy of wireless sensor networks using a deep learning and blockchain approach with DV-HOP algorithm for DDoS mitigation and node localization","volume":"2025","author":"Kaur","year":"2025","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1007\/s11277-023-10643-6","article-title":"Classification of distributed denial of service attacks in VANET: a survey","volume":"132","author":"Vamshi Krishna","year":"2023","journal-title":"Wirel Pers Commun"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"100037","DOI":"10.1016\/j.csa.2024.100037","article-title":"Securing the road ahead: machine learning-driven DDoS attack detection in VANET cloud environments","volume":"2","author":"Setia","year":"2024","journal-title":"Cyber Secur Applicat"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4089","DOI":"10.1049\/iet-com.2020.0477","article-title":"Deep network approach with stacked sparse autoencoders in detection of DDoS attacks on SDN-based VANET","volume":"14","author":"Polat","year":"2020","journal-title":"IET Commun"},{"key":"ref10","first-page":"141","article-title":"Intelligent DoS attack detection with congestion control technique for VANETs","volume":"72","author":"Gopi","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref11","first-page":"82","article-title":"Machine learning approach of hybrid KSVN algorithm to detect DDoS attack in VANET","volume":"12","author":"Kadam","year":"2021","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref12","series-title":"2022 International Conference on Artificial Intelligence of Things (ICAIoT); 2022 Dec 29\u201330","first-page":"1","article-title":"Machine learning-based architecture for DDoS detection in VANETs system","author":"Alkadiri","year":"2022"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.3390\/s23052594","article-title":"An adaptive real-time malicious node detection framework using machine learning in vehicular ad-hoc networks (VANETs)","volume":"23","author":"Rashid","year":"2023","journal-title":"Sensors"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"8477","DOI":"10.1109\/JIOT.2022.3199712","article-title":"Optimization of RBF-SVM kernel using grid search algorithm for DDoS attack detection in SDN-based VANET","volume":"10","author":"Oluchi Anyanwu","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4030","DOI":"10.3390\/math10214030","article-title":"An improved machine learning model with hybrid technique in VANET for robust communication","volume":"10","author":"Marwah","year":"2022","journal-title":"Mathematics"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1007\/s11277-020-07549-y","article-title":"Hybrid algorithm to detect DDoS attacks in VANETs","volume":"114","author":"Adhikary","year":"2020","journal-title":"Wirel Pers Commun"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"395","DOI":"10.3390\/wevj15090395","article-title":"Optimized feature selection for DDoS attack recognition and mitigation in SD-VANETs","volume":"15","author":"Tariq","year":"2024","journal-title":"World Elect Veh J"},{"key":"ref18","first-page":"65","article-title":"Defense mechanisms for vehicular networks: deep learning approaches for detecting DDoS attacks","volume":"15","author":"Lekshmi","year":"2024","journal-title":"Int J Adv Comput Sci Applicat"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7612","DOI":"10.3390\/s22197612","article-title":"RSU-based online intrusion detection and mitigation for VANET","volume":"22","author":"Haydari","year":"2022","journal-title":"Sensors"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2024.12.009","article-title":"DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing","author":"Gu","year":"2024","journal-title":"Digit Commun Netw"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-3-642-12331-3_2","author":"Riley","year":"2010","journal-title":"Modeling and tools for network simulation"},{"key":"ref22","series-title":"Proceedings of the SIMUL 2011, The Third International Conference on Advances in System Simulation; 2011 Oct 23\u201328","article-title":"SUMO\u2013simulation of urban mobility: an overview","author":"Behrisch","year":"2011"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J Artif Intell Res"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_67733\/TSP_CMC_67733.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:20:10Z","timestamp":1763346010000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":23,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067733","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}