{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T08:08:28Z","timestamp":1770624508938,"version":"3.49.0"},"reference-count":38,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"work was funded by the Deanship of Scientific Research at Jouf University through the Fast-track Research Funding Program"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2024,12,31]]},"DOI":"10.1080\/08839514.2024.2381882","type":"journal-article","created":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T08:56:07Z","timestamp":1721984167000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments"],"prefix":"10.1080","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0161-7147","authenticated-orcid":false,"given":"Faeiz","family":"Alserhani","sequence":"first","affiliation":[{"name":"Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, Al Jouf, Saudi Arabia"}]}],"member":"301","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1515"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDMA54072.2022.00037"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23208362"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13137774"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100936"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/su15129395"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23146302"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12389-4"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2301.13686"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15100318"},{"issue":"1","key":"e_1_3_2_12_1","first-page":"8068038","article-title":"Blockchain-based secure localization against malicious nodes in iot-based wireless sensor networks using federated learning","volume":"2023","author":"Gebremariam G. G.","year":"2023","unstructured":"Gebremariam, G. G., J. Panda and S. Indu. 2023. Blockchain-based secure localization against malicious nodes in iot-based wireless sensor networks using federated learning. Wireless Communications and Mobile Computing 2023 (1):8068038.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108439"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3199735"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23156757"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-01050-5"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3244168"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2023.108498"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3198618"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103784"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3215507"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100471"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-07974-0"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102820"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3274691"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22093498"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105969"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00703-0"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16853-1"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-023-10139-2"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09776-x"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.03.008"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001438"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3290613"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2022.3159314"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103414"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2024.2381882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T16:17:19Z","timestamp":1734365839000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2024.2381882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1080\/08839514.2024.2381882"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2024.2381882","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-03-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-22","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2381882"}}