{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:49:31Z","timestamp":1758808171134,"version":"3.37.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:00:00Z","timestamp":1725667200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:00:00Z","timestamp":1725667200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,7]]},"DOI":"10.1109\/aibthings63359.2024.10863608","type":"proceedings-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T18:38:03Z","timestamp":1738953483000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced IoT Data Security with Robust AES-CBC Encryption Algorithm"],"prefix":"10.1109","author":[{"given":"Mohamed A.","family":"Torad","sequence":"first","affiliation":[{"name":"Higher Technological Institute,Department of Electronics and Communication Eng.,,10th of Ramadan City,Egypt"}]},{"given":"Mohamed Abdulhamid","family":"ElKassas","sequence":"additional","affiliation":[{"name":"Higher Technological Institute,Department of Electronics and Communication Eng.,,10th of Ramadan City,Egypt"}]},{"given":"Ahmed F.","family":"Ashour","sequence":"additional","affiliation":[{"name":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"}]},{"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[{"name":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"}]},{"given":"Eslam Samy","family":"El-Mokadem","sequence":"additional","affiliation":[{"name":"Higher Technological Institute,Department of Electronics and Communication Eng.,,10th of Ramadan City,Egypt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9070683"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.026516"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3013634"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v20i4.23763"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2022.021713"},{"article-title":"Evaluating classification methods in predicting intrusion detection systems in IoT","volume-title":"Proc. of the 2024 IEEE International Opportunity Research Scholars Symposium (IEEE ORSS 2024)","author":"Kaddour","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2022.02.304"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.021269"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.11591\/ijres.v10.i2.pp90-98"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ORSS58323.2023.10161830"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033435"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE.2019.8723807"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864513"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2018.8519913"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2750146"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s41745-020-00208-y"}],"event":{"name":"2024 IEEE 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","start":{"date-parts":[[2024,9,7]]},"location":"Mt Pleasant, MI, USA","end":{"date-parts":[[2024,9,8]]}},"container-title":["2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10860733\/10861884\/10863608.pdf?arnumber=10863608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T18:28:28Z","timestamp":1739212108000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10863608\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/aibthings63359.2024.10863608","relation":{},"subject":[],"published":{"date-parts":[[2024,9,7]]}}}