{"id":"https://openalex.org/W4414539577","doi":"https://doi.org/10.1109/icc52391.2025.11160909","title":"Deep Multimodal Learning for Real-Time Ddos Attacks Detection in Internet of Vehicles","display_name":"Deep Multimodal Learning for Real-Time Ddos Attacks Detection in Internet of Vehicles","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414539577","doi":"https://doi.org/10.1109/icc52391.2025.11160909"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11160909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11160909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116053972","display_name":"Mohamed Ababsa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144804","display_name":"Laboratoire de Recherche en Informatique","ror":"https://ror.org/04e3ktk27","country_code":"FR","type":"facility","lineage":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210144804","https://openalex.org/I4210159245"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Mohamed Ababsa","raw_affiliation_strings":["&#x00C9;cole Sup&#x00E9;rieure en Informatique,Sidi Bel Abb&#x00E8;s,Algeria,22000"],"affiliations":[{"raw_affiliation_string":"&#x00C9;cole Sup&#x00E9;rieure en Informatique,Sidi Bel Abb&#x00E8;s,Algeria,22000","institution_ids":["https://openalex.org/I4210144804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004135395","display_name":"Soheyb Ribouh","orcid":"https://orcid.org/0000-0002-5991-8997"},"institutions":[{"id":"https://openalex.org/I4210105918","display_name":"Normandie Universit\u00e9","ror":"https://ror.org/01k40cz91","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210108118","display_name":"Laboratoire d'Informatique, du Traitement de l'Information et des Syst\u00e8mes","ror":"https://ror.org/01f1vfy95","country_code":"FR","type":"facility","lineage":["https://openalex.org/I141576021","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210108118","https://openalex.org/I62396329","https://openalex.org/I88814501"]},{"id":"https://openalex.org/I62396329","display_name":"Universit\u00e9 de Rouen Normandie","ror":"https://ror.org/03nhjew95","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I62396329"]},{"id":"https://openalex.org/I88814501","display_name":"Institut National des Sciences Appliqu\u00e9es Rouen Normandie","ror":"https://ror.org/020ws7586","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I88814501"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Soheyb Ribouh","raw_affiliation_strings":["Universit&#x00E9; Le Havre Normandie, Normandie Univ LITIS UR 4108,Univ Rouen Normandie, INSA Rouen Normandie,Rouen,France,F-76000"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Le Havre Normandie, Normandie Univ LITIS UR 4108,Univ Rouen Normandie, INSA Rouen Normandie,Rouen,France,F-76000","institution_ids":["https://openalex.org/I62396329","https://openalex.org/I4210108118","https://openalex.org/I88814501","https://openalex.org/I4210105918"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011583759","display_name":"Abdelhamid Malki","orcid":"https://orcid.org/0000-0002-2937-9320"},"institutions":[{"id":"https://openalex.org/I4210144804","display_name":"Laboratoire de Recherche en Informatique","ror":"https://ror.org/04e3ktk27","country_code":"FR","type":"facility","lineage":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210144804","https://openalex.org/I4210159245"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abdelhamid Malki","raw_affiliation_strings":["LabRi Laboratory,&#x00C9;cole Sup&#x00E9;rieure en Informatique,Sidi Bel Abb&#x00E8;s,Algeria,22000"],"affiliations":[{"raw_affiliation_string":"LabRi Laboratory,&#x00C9;cole Sup&#x00E9;rieure en Informatique,Sidi Bel Abb&#x00E8;s,Algeria,22000","institution_ids":["https://openalex.org/I4210144804"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042499396","display_name":"Lyes Khoukhi","orcid":"https://orcid.org/0000-0002-1922-769X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210105918","display_name":"Normandie Universit\u00e9","ror":"https://ror.org/01k40cz91","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]},{"id":"https://openalex.org/I98702875","display_name":"Universit\u00e9 de Caen Normandie","ror":"https://ror.org/051kpcy16","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Lyes Khoukhi","raw_affiliation_strings":["ENSICAEN, Normandie Univ, UNICAEN CNRS,GREYC,Caen,France"],"affiliations":[{"raw_affiliation_string":"ENSICAEN, Normandie Univ, UNICAEN CNRS,GREYC,Caen,France","institution_ids":["https://openalex.org/I4210139483","https://openalex.org/I98702875","https://openalex.org/I1294671590","https://openalex.org/I4210105918"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116053972"],"corresponding_institution_ids":["https://openalex.org/I4210144804"],"apc_list":null,"apc_paid":null,"fwci":3.3332,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93577969,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"3039","last_page":"3044"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.739300012588501},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.52920001745224},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4571000039577484},{"id":"https://openalex.org/keywords/intelligent-transportation-system","display_name":"Intelligent transportation system","score":0.4564000070095062},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.44780001044273376},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42640000581741333},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.4099000096321106},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.3337000012397766},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.3314000070095062}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.739300012588501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7379999756813049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6003999710083008},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.52920001745224},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4571000039577484},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.4564000070095062},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.44780001044273376},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42640000581741333},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.4099000096321106},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3772999942302704},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.3337000012397766},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3314000070095062},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.32760000228881836},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3240000009536743},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3077000081539154},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.29760000109672546},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.28940001130104065},{"id":"https://openalex.org/C2777974031","wikidata":"https://www.wikidata.org/wiki/Q493641","display_name":"Multimodal transport","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.2671000063419342},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.26570001244544983},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc52391.2025.11160909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11160909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-05296354v1","is_oa":false,"landing_page_url":"https://hal.science/hal-05296354","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications, Jun 2025, Montreal, France. pp.3039-3044, &#x27E8;10.1109/ICC52391.2025.11160909&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2964314709","https://openalex.org/W2995310170","https://openalex.org/W3014294587","https://openalex.org/W3041532898","https://openalex.org/W3045657906","https://openalex.org/W3101528265","https://openalex.org/W3186684121","https://openalex.org/W3200339141","https://openalex.org/W4205350808","https://openalex.org/W4211134207","https://openalex.org/W4223589767","https://openalex.org/W4293239788","https://openalex.org/W4316659052","https://openalex.org/W4399362892","https://openalex.org/W4400646913","https://openalex.org/W4400811547"],"related_works":[],"abstract_inverted_index":{"The":[0,159],"advancement":[1],"of":[2,10,34,43,54,152,182],"Intelligent":[3],"Transport":[4],"Systems":[5],"(ITS)":[6],"and":[7,16,100,109,138,146,195,201],"the":[8,44,51,127,150,153],"Internet":[9],"Vehicles":[11],"(IoV)":[12],"enhances":[13],"road":[14],"safety":[15],"traveler":[17],"comfort":[18],"by":[19,107],"enabling":[20,142],"safer,":[21],"more":[22],"efficient":[23],"transportation":[24],"networks.":[25],"However,":[26],"these":[27],"technologies":[28],"are":[29],"vulnerable":[30],"to":[31,48,80,133],"a":[32,73,113,118,135],"range":[33],"security":[35],"threats":[36,47],"that":[37],"malicious":[38,208],"actors":[39],"could":[40,59],"exploit.":[41],"One":[42],"most":[45],"severe":[46],"IoV":[49],"is":[50,162],"Distributed":[52],"Denial":[53],"Service":[55],"(DDoS)":[56],"attack,":[57],"which":[58],"disrupt":[60],"traffic":[61],"flow,":[62],"disable":[63],"vehicular":[64,205],"communication,":[65],"or":[66],"even":[67],"cause":[68],"accidents.":[69],"This":[70,123],"paper":[71],"proposes":[72],"novel":[74],"Deep":[75],"Multimodal":[76],"Learning":[77,193],"(DML)":[78],"approach":[79,161],"detect":[81],"DDoS":[82,144],"attacks":[83],"in":[84,88,164,203],"IoV,":[85],"strengthening":[86],"cybersecurity":[87],"intelligent":[89],"transport":[90],"systems.":[91],"Our":[92,175],"DML":[93,176],"model":[94,177],"integrates":[95],"Long":[96],"Short-Term":[97],"Memory":[98],"(LSTM)":[99],"Gated":[101],"Recurrent":[102],"Unit":[103],"(GRU)":[104],"networks,":[105],"enhanced":[106],"Attention":[108],"Gating":[110],"mechanisms,":[111],"alongside":[112],"Multi-Layer":[114],"Perceptron":[115],"(MLP)":[116],"with":[117,171],"multimodal":[119],"intermediate":[120],"fusion":[121],"architecture.":[122],"innovative":[124],"method":[125],"leverages":[126],"Framework":[128],"for":[129],"Misbehavior":[130,156],"Detection":[131],"(F2MD)":[132],"generate":[134],"synthetic":[136],"dataset":[137],"deploy":[139],"our":[140],"model,":[141],"real-time":[143,165],"detection":[145],"mitigation":[147],"while":[148],"overcoming":[149],"limitations":[151],"Vehicular":[154],"Reference":[155],"(VeReMi)":[157],"dataset.":[158],"proposed":[160],"evaluated":[163],"across":[166],"various":[167],"simulated":[168],"real-world":[169],"scenarios":[170],"differing":[172],"attacker":[173],"densities.":[174],"achieves":[178],"an":[179],"average":[180],"accuracy":[181],"<tex":[183],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[184],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathbf{9":[185],"6.":[186],"6":[187],"3":[188],"\\%}$</tex>,":[189],"outperforming":[190],"classical":[191],"Machine":[192],"(ML)":[194],"state-of-the-art":[196],"approaches,":[197],"demonstrating":[198],"significant":[199],"efficacy":[200],"reliability":[202],"safeguarding":[204],"networks":[206],"against":[207],"cyberattacks.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
