{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:03:08Z","timestamp":1778256188571,"version":"3.51.4"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"SAFE DEMON SAFE Driving by E-Health Monitoring, Sicilian Region, Italy","award":["G29J18000720007"],"award-info":[{"award-number":["G29J18000720007"]}]},{"name":"SAFE DEMON SAFE Driving by E-Health Monitoring, Sicilian Region, Italy","award":["PON FESR 2014\/2020-Action 1.1.5"],"award-info":[{"award-number":["PON FESR 2014\/2020-Action 1.1.5"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3246660","type":"journal-article","created":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T18:26:01Z","timestamp":1677695161000},"page":"19024-19038","source":"Crossref","is-referenced-by-count":44,"title":["Deep Learning Based Anomaly Detection for Fog-Assisted IoVs Network"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0696-5546","authenticated-orcid":false,"given":"Shumayla","family":"Yaqoob","sequence":"first","affiliation":[{"name":"Department of Electrical Electronic Computer and Telecommunication Engineering, University of Catania, Catania, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5167-4553","authenticated-orcid":false,"given":"Asad","family":"Hussain","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Computer Science, National University of Modern Languages, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4379-822X","authenticated-orcid":false,"given":"Fazli","family":"Subhan","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Computer Science, National University of Modern Languages, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9793-1885","authenticated-orcid":false,"given":"Giuseppina","family":"Pappalardo","sequence":"additional","affiliation":[{"name":"Department of Civil Engineering and Architecture, University of Catania, Catania, Italy"}]},{"given":"Muhammad","family":"Awais","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Edge Hill University Lancashire, Ormskirk, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2603219"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2017.7510736"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2690902"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01253-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2887075"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2983994"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.2977829"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc.2018.8450433"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2762345"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2902459"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2532863"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc.2018.8450402"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2884672"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700332"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.031413.00127"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8530312"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.37394\/23203.2021.16.54"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1021\/acsnano.1c00536"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s151229822"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2017.2764095"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2816590"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8858444"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2958185"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101565"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102866"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-019-00081-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1701270"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2020.2968516"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2886457"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022855"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8761459"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2021.100156"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/csaiee54046.2021.9543241"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3116612"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/eti4.051663.2021.9619421"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02205-9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/wincom.2018.8629718"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/icoin53446.2022.9687135"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/icecos.2018.8605181"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s21134294"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.2990984"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182"},{"issue":"3","key":"ref50","first-page":"276","article-title":"DDoS attack detection using hybrid machine learning based IDS models","volume":"81","author":"Sumathi","year":"2022","journal-title":"J. Sci. Ind. Res."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7334"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2018.2815418"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2800281"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2809670"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2694844"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3011726"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10050187.pdf?arnumber=10050187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:19:53Z","timestamp":1707848393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10050187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3246660","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}