{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:07:50Z","timestamp":1773983270077,"version":"3.50.1"},"reference-count":181,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2023.3264928","type":"journal-article","created":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T17:55:20Z","timestamp":1680717320000},"page":"1445-1481","source":"Crossref","is-referenced-by-count":37,"title":["A Survey on Controller Area Network Reverse Engineering"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2762-4123","authenticated-orcid":false,"given":"Alessio","family":"Buscemi","sequence":"first","affiliation":[{"name":"Faculty of Science, Technology and Medicine, University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9035-2592","authenticated-orcid":false,"given":"Ion","family":"Turcanu","sequence":"additional","affiliation":[{"name":"IT for Innovative Services Department, Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"}]},{"given":"German","family":"Castignani","sequence":"additional","affiliation":[{"name":"Digital Twin Innovation Center, Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"}]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Brandenburg University of Technology, Cottbus, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7374-3927","authenticated-orcid":false,"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"Faculty of Science, Technology and Medicine, University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0086-8777","authenticated-orcid":false,"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Michigan at Ann Arbor, Ann Arbor, MI, USA"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387586"},{"key":"ref56","article-title":"Discoverer: Automatic protocol reverse engineering from network traces","author":"cui","year":"2007","journal-title":"Proc 16th USENIX Secur Symp"},{"key":"ref59","author":"smith","year":"2023","journal-title":"The Car Hacker's Handbook A Guide for the Penetration Tester"},{"key":"ref58","author":"blin","year":"0","journal-title":"CAN bus reverse-engineering with Arduino and iOS"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8370341"},{"key":"ref52","year":"0","journal-title":"IDA-Pro"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.28"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900120"},{"key":"ref54","year":"2023","journal-title":"Wireshark Go deep"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915983"},{"key":"ref170","first-page":"264","article-title":"Designing a 5G architecture to overcome the challenges of the teleoperated transport and logistics","year":"2022","journal-title":"Proc IEEE 19th Annu Consum Commun Netw Conf (CCNC)"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref51","year":"0","journal-title":"NET Reflector"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref50","author":"dupuy","year":"0","journal-title":"Java decompiler"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921208"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3029723"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2973715"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700015"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900659"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/smr.270"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/52.363166"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.30"},{"key":"ref47","year":"2010","journal-title":"Use UML to reverse-engineer visual studio NET source code"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-856-2"},{"key":"ref41","author":"air force","year":"2015","journal-title":"Soviet union impounds and copies B-29"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/cce:19930026"},{"key":"ref179","year":"2019","journal-title":"Anon CAN BUS Explained - A Simple Intro"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2013.0505"},{"key":"ref49","author":"eilam","year":"2005","journal-title":"Reversing Secrets of Reverse Engineering"},{"key":"ref8","year":"2020","journal-title":"Controller area network (CAN) overview"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921162"},{"key":"ref7","year":"0"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/M-COM.2016.7785879"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59767-6_31"},{"key":"ref4","year":"2023","journal-title":"Robert Bosch GmbH"},{"key":"ref3","author":"leibson","year":"2022","journal-title":"A history of early microcontrollers part 5 The Motorola 6801"},{"key":"ref6","year":"0"},{"key":"ref5","year":"2015"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2698"},{"key":"ref101","first-page":"949","article-title":"{plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {over-the-air} attack surface in automotive {IoT}","author":"wen","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref40","author":"goldsworthy","year":"2006","journal-title":"The Fall of Carthage The Punic Wars 265-146 BC"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2899062"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2019.8906465"},{"key":"ref37","article-title":"Machine learning-based methods for driver identification and Behavior assessment: Applications for CAN and floating car data","author":"jafarnejad","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2019.8893165"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECOME.2018.8658720"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref30","author":"avatefipour","year":"2018","journal-title":"State-of-the-art survey on in-vehicle network communication (CAN-Bus) security and vulnerabilities"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2869351"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.4271\/11-01-01-0003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2736344"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/52.43044"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"ref155","article-title":"Recent advances in open set recognition: A survey","author":"geng","year":"2018","journal-title":"arXiv 1811 08581"},{"key":"ref156","author":"electronics","year":"2023","journal-title":"CANedge2 2x CAN bus data logger (SD + WiFi)"},{"key":"ref153","author":"van dijk","year":"2017","journal-title":"Future Vehicle Networks and ECUS Architecture and Technology Considerations"},{"key":"ref154","author":"congress","year":"2017","journal-title":"IHS markit Sales of automotive ECUs to hit $211B in 2030 % CAGR"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7881182"},{"key":"ref152","author":"sadanand","year":"2019","journal-title":"Motorcycle ECU (engine control unit) explained"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3124550"},{"key":"ref23","first-page":"751","article-title":"Automatic reverse engineering of CAN bus data using machine learning techniques","author":"huybrechts","year":"2017","journal-title":"Proc Int Conf P2P Parallel Grid Cloud Internet Comput"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3023538"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CAVS51000.2020.9334650"},{"key":"ref159","year":"2019","journal-title":"Extended signal multiplexing in DBC databases"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00061"},{"key":"ref157","author":"zago et al","year":"2020","journal-title":"ReCAN source&#x2013;reverse engineering of controller area networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3092354"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918582"},{"key":"ref28","author":"burkacky","year":"2019","journal-title":"Automotive software and electronics 2030"},{"key":"ref27","year":"2018","journal-title":"2017 production statistics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3516517"},{"key":"ref167","year":"2023","journal-title":"7 Benefits of Autonomous Cars"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.5198\/jtlu.2019.1405"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2410258"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2410831"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2016.2578706"},{"key":"ref160","year":"2023","journal-title":"Multiplex messages"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2012.6232229"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3057017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref15","author":"burkacky","year":"2021","journal-title":"Software will be what differentiates players in the automotive industry within a few years incumbents must make significant shifts in technology competitive dynamics and talent"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.3390\/s20082364"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2020.0531"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1612"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_9"},{"key":"ref126","year":"2021","journal-title":"Reverse Engineering"},{"key":"ref96","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2012.6356590"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100310"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5650245"},{"key":"ref124","year":"2019","journal-title":"ECU Remapping | what is it and is it safe for your car?"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319180"},{"key":"ref125","year":"2019","journal-title":"Not only positive-the chip tuning and its dangers"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993938"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2836308"},{"key":"ref19","year":"2010"},{"key":"ref18","author":"insights","year":"2023","journal-title":"Vehicle-telematics market size share and COVID-19 impact"},{"key":"ref93","first-page":"15","article-title":"Adventures in automotive networks and control units","volume":"21","author":"miller","year":"2013","journal-title":"DEF CON"},{"key":"ref133","article-title":"CaCAN-centralized authentication system in CAN (controller area network)","author":"kurachi","year":"2014","journal-title":"Proc 14th Int Conf Embedded Secur Cars (ESCAR)"},{"key":"ref92","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7413993"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33389-2_21"},{"key":"ref94","first-page":"447","article-title":"Experimental security analysis of a modern automobile","year":"2010","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref132","first-page":"20","article-title":"CANAuth&#x2013;A simple, backward compatible broadcast authentication protocol for CAN bus","volume":"2011","author":"van herrewege","year":"2011","journal-title":"Proc ECRYPT Workshop Lightweight Cryptography"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053160"},{"key":"ref91","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2015.04.003"},{"key":"ref89","year":"0"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485883"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24231"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134623"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.2307\/2288117"},{"key":"ref138","year":"2023","journal-title":"Specification Secure Onboard Communication"},{"key":"ref88","year":"1999"},{"key":"ref135","first-page":"13","article-title":"A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier","author":"han","year":"2015","journal-title":"Proc Eur Embedded Secur Cars (ESCAR)"},{"key":"ref87","first-page":"1939","article-title":"Towards automatically reverse engineering vehicle diagnostic protocols","year":"2022","journal-title":"Proc USENIX Security07"},{"key":"ref136","first-page":"225","article-title":"VatiCAN&#x2013;Vetted, authenticated CAN bus","author":"n\\\" u rnberger","year":"2016","journal-title":"Proc Int Conf Cryptographic Hardw Embedded Syst"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221383"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2928577"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref84","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proc KDD"},{"key":"ref142","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/BF01890115"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_15"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/IMCET.2018.8603057"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917500"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0111"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3063261"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2018.8618564"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690615"},{"key":"ref109","year":"2023","journal-title":"Motor vehicles increasingly vulnerable to remote exploits"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3098162"},{"key":"ref107","first-page":"2122","article-title":"In-vehicle CAN bus tampering attacks detection for connected and autonomous vehicles using an improved isolation forest method","volume":"24","author":"duan","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref75","year":"2023","journal-title":"CANalyzer"},{"key":"ref104","first-page":"232","article-title":"A security analysis of an {in-vehicle} Infotainment and App platform","author":"mazloom","year":"2016","journal-title":"Proc 10th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref74","year":"2023","journal-title":"Cantrace&#x2013;CAN bus analyzer software"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00081"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3618-9"},{"key":"ref76","author":"ai","year":"2023","journal-title":"OpenDBC"},{"key":"ref103","first-page":"1","article-title":"Free-fall: Hacking tesla from wireless to CAN bus","volume":"25","author":"nie","year":"2017","journal-title":"Black Hat Briefings"},{"key":"ref2","author":"bertoncello","year":"2016","journal-title":"Monetizing Car Data&#x2014;New Service Business Opportunities to Create New Customer Benefits"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.30657\/pea.2018.20.01","article-title":"Automatization in road transport: A review","volume":"20","author":"derenda","year":"2018","journal-title":"Prod Eng Arch"},{"key":"ref71","year":"0"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops53468.2022.9814703"},{"key":"ref70","year":"0"},{"key":"ref112","first-page":"31","article-title":"Driver status identification from driving behavior signals","author":"\\\" o zt\\\" u rk","year":"2012","journal-title":"Digital Signal Processing for In-Vehicle Systems and Safety"},{"key":"ref73","year":"2023","journal-title":"Managing network and communication data with candb\\ensuremath+\\ensuremath+"},{"key":"ref72","year":"2023","journal-title":"OBD2 codes and meanings"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700505"},{"key":"ref68","year":"2023","journal-title":"Arduino"},{"key":"ref119","first-page":"123","article-title":"Real-time driver identification using vehicular big data and deep learning","year":"2018","journal-title":"Proc 21st Int Conf Intell Transp Syst (ITSC)"},{"key":"ref67","year":"2014","journal-title":"Kvaser leaf light v2 user's guide"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906929"},{"key":"ref69","year":"0","journal-title":"RaspberryPi"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1372"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2870826"},{"key":"ref115","first-page":"953","article-title":"Driver identification using automobile sensor data from a single turn","year":"2016","journal-title":"Proc IEEE 19th Int Conf Intell Transp Syst (ITSC)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"},{"key":"ref66","year":"2020","journal-title":"PEAK-System"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856806"},{"key":"ref65","year":"2021","journal-title":"CLX000 intro release FW 5 83"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795582"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/VNC52810.2021.9644673"},{"key":"ref122","year":"2007","journal-title":"Data collection with \"UYANIK"},{"key":"ref123","first-page":"405","article-title":"Efficient multi-label classification with many labels","author":"bi","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref62","year":"1989"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0118-7"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363190"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.5220\/0007389501360145"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10226436\/10092880.pdf?arnumber=10092880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T19:22:33Z","timestamp":1694460153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10092880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":181,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2023.3264928","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}