{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:03:10Z","timestamp":1752984190569,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995825","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["NABA: Novel Adaptive Broadcast Storm Avoidance in NDN and SDN based FANET"],"prefix":"10.1109","author":[{"given":"Karamath","family":"Ateeq","sequence":"first","affiliation":[{"name":"Skyline University College University City Sharjah,School of Information Technology,Sharjah,UAE,1797"}]},{"given":"P.","family":"RamLal","sequence":"additional","affiliation":[{"name":"National Institute of Technology,School of Management,Warangal,Telangana,India"}]},{"given":"Ossma Ali","family":"Thawabeh","sequence":"additional","affiliation":[{"name":"Skyline University College, University City Sharjah,Dean of Student Affairs,Sharjah,UAE,1797"}]},{"given":"Ahmad","family":"Arsalan","sequence":"additional","affiliation":[{"name":"Bahria University,Department of Computer Science,Islamabad,Pakistan"}]},{"given":"Muhammad","family":"Burhan","sequence":"additional","affiliation":[{"name":"University of Punjab,Department of Information Technology,Lahore,Pakistan"}]},{"given":"Muhammad Umar","family":"Nasir","sequence":"additional","affiliation":[{"name":"Riphah International University,Riphah School of Computing and Innovation,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2495297"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2909530"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-013-9959-7"},{"key":"ref5","article-title":"Review of communi- cation protocols for FANETs:(Flying ad-hoc networks)","volume-title":"In International Conference on Engineering and Emerging Technologies","author":"Khan","year":"2015"},{"issue":"7","key":"ref6","article-title":"Flying ad-hoc networks: Routing protocols, mobility models","author":"Yassein","year":"2016","journal-title":"International Journal of Advanced Com- puter Science and Applications (IJACSA)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100187"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2017.2751045"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/eucnc.2014.6882665"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3138808.3138812"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3845-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99061-3_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502462"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51204-4_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8761968"},{"key":"ref17","first-page":"1","article-title":"SRSC: SDNbased routing scheme for CCN","volume-title":"In-Network Softwarization (Net- Soft), 2015 1 st IEEE Conference on","author":"Aubry"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2859-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33936-8_23"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3138808.3138812"},{"key":"ref21","first-page":"4","article-title":"NS-3: Network simulator 3","volume-title":"UTM Lab Meeting April","volume":"20","author":"Carneiro","year":"2010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-18760"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4243700"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s22145247"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004536"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023557"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-1873-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023785"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa068"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023278"},{"issue":"1","key":"ref31","first-page":"188","article-title":"loT enabled smart monitoring of coronavirus empowered with fuzzy inference system","volume":"6","author":"Fatima","year":"2020","journal-title":"International journal of advance research, ideas and innovations in technology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE47252.2019.8940752"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS54253.2022.9758929"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.03.003"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.12.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMET.2019.8673401"},{"issue":"1","key":"ref37","first-page":"I","article-title":"Intrusion Detection System for Apache Web Server Empowered with Machine Learning Approaches","volume":"1","author":"Muhammad","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"2","key":"ref38","first-page":"69","article-title":"AA Novel Method to improve the Round Robin CPU Scheduling Quantum time using Arithmetic Mean","volume":"1","author":"Akmal","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"1","key":"ref39","article-title":"Removal of the Noise & Blurriness using Global & Local Image Enhancement Equalization Techniques","volume":"1","author":"Aslam","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"1","key":"ref40","first-page":"I","article-title":"AA systematic review: Explainable Artificial Intelligence (XAI) based disease prediction","volume":"1","author":"Muneer","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"issue":"1","key":"ref41","first-page":"16","article-title":"Performance Analysis of Multiple Networks of Blockchain with Varying Transaction","volume":"1","author":"Iftikhar","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"issue":"1","key":"ref42","article-title":"The Sybil Attack Prevention Algorithm: Makes Blockchain Network More Secure","volume":"1","author":"Ud Din Siddiqi","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023392"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.029400"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2022.5.014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.06.007"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995825.pdf?arnumber=9995825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:48:17Z","timestamp":1706791697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995825","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}