{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:05:02Z","timestamp":1772233502047,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,12]]},"DOI":"10.1109\/iwcmc65282.2025.11059696","type":"proceedings-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T17:42:13Z","timestamp":1751478133000},"page":"1597-1603","source":"Crossref","is-referenced-by-count":1,"title":["A Comprehensive Multi-Layered Cybersecurity Framework for Internet of Vehicles: Securing Vulnerable Nodes of V2X Communication Systems"],"prefix":"10.1109","author":[{"given":"Imen","family":"Loussaief","sequence":"first","affiliation":[{"name":"University of Carthage,Tunisia Polytechnic School (TPS) Advanced Systems Lab (LSA),Tunis,Tunisia"}]},{"given":"Sondes","family":"Ksibi","sequence":"additional","affiliation":[{"name":"University of Carthage,Higher School of Communication of Tunis (Sup'Com) Innov&#x2019;Com \\Digital Security Research Lab,Tunis,Tunisia"}]},{"given":"Faouzi","family":"Jaidi","sequence":"additional","affiliation":[{"name":"University of Carthage, Higher School of Communication of Tunis (Sup'Com), Innov&#x2019;Com \\ Digital Security Research Lab University of Carthage,National School of Engineers of Carthage,Tunis,Tunisia"}]},{"given":"Khaled","family":"Nouri","sequence":"additional","affiliation":[{"name":"University of Carthage,Tunisia Polytechnic School (TPS) Advanced Systems Lab (LSA),Tunis,Tunisia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/en13184813"},{"key":"ref2","article-title":"Connected car market analysis report","year":"2023","journal-title":"Market analysis report"},{"key":"ref3","volume-title":"Distributed computing in an AECC system","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2024.100846"},{"key":"ref5","author":"Chen","journal-title":"Privacy-Preserving Authentication Schemes for Fog-Enabled IoV: Challenges and Solutions"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081812"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962554"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8461224"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2021.112566"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IC_ASET58101.2023.10150874"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3444780"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/1818079"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.treng.2024.100252"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18280\/isi.290336"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s24020368"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102644"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3378592"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073408"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/vehicles6010020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IV55156.2024.10588389"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MetroInd4.0IoT61288.2024.10584217"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3347200"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3160000"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3243624"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3169500"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/jcp3030025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101209"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s24196377"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00923-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102541"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.617\/v2\/review2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2570-8.ch009"},{"key":"ref34","article-title":"Traffic Congestion Sybil Attack Detection in VANETs Using Machine Learning Techniques","volume-title":"Master\u2019s thesis","author":"Khanduja","year":"2024"},{"key":"ref35","article-title":"A Predictive Approach to Detect and Mitigate Sybil Attacks in a Waiting Time-Based Adaptive Traffic Signal Controller","volume-title":"Doctoral dissertation","author":"Al Ani","year":"2024"},{"issue":"1","key":"ref36","first-page":"41","article-title":"DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS","volume":"7","author":"Orman","year":"2023","journal-title":"Uluslararas\u0131 S\u00fcrd\u00fcr\u00fclebilir M\u00fchendislik ve Teknoloji Dergisi"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2024.08.011"}],"event":{"name":"2025 International Wireless Communications and Mobile Computing (IWCMC)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2025,5,12]]},"end":{"date-parts":[[2025,5,16]]}},"container-title":["2025 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11059430\/11059431\/11059696.pdf?arnumber=11059696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:23:28Z","timestamp":1751520208000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11059696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/iwcmc65282.2025.11059696","relation":{},"subject":[],"published":{"date-parts":[[2025,5,12]]}}}