{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:03:25Z","timestamp":1774368205858,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"20","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,10,15]]},"DOI":"10.1109\/jiot.2025.3590966","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:51:00Z","timestamp":1753732260000},"page":"41591-41607","source":"Crossref","is-referenced-by-count":6,"title":["A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4316-4975","authenticated-orcid":false,"given":"Md Ashraf","family":"Uddin","sequence":"first","affiliation":[{"name":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5652-7408","authenticated-orcid":false,"given":"Nam H.","family":"Chu","sequence":"additional","affiliation":[{"name":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5141-0534","authenticated-orcid":false,"given":"Reza","family":"Rafeh","sequence":"additional","affiliation":[{"name":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9146-2459","authenticated-orcid":false,"given":"Mutaz","family":"Barika","sequence":"additional","affiliation":[{"name":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809"},{"key":"ref2","volume-title":"Gartner predicts outdoor surveillance cameras will be largest market for 5G Internet of Things solutions over next three years.","author":"Goasduff","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2024.101699"},{"key":"ref4","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume-title":"Black Hat USA","author":"Miller"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00456-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271768"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s24123848"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101209"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45778-5_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/sym12020203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-80021-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.108006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00213-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08655-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/computers11120170"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102957"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3259474"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3102581"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120626"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3098636"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3119968"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283220"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2018.2801622"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.130"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.08.010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103330"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref36","article-title":"ROAD: The real ORNL automotive dynamometer controller area network intrusion detection dataset (with a comprehensive can IDS dataset survey & guide)","author":"Verma","year":"2020","journal-title":"arXiv:2012.14600"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4108\/eetiot.6523"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP64064.2024.10711086"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00903-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3690134.3694819"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.471"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-94445-9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2025.0160327"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852410"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhydrol.2021.126350"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887076"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900659"},{"key":"ref51","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1186\/s12302-020-00338-1"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9263605"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2915936"},{"key":"ref55","article-title":"LLM-based continuous intrusion detection framework for next-gen networks","author":"Adjewa","year":"2024","journal-title":"arXiv:2411.03354"},{"key":"ref56","volume-title":"Llama 2.","year":"2023"},{"key":"ref57","volume-title":"Inference characteristics of Llama.","author":"Aman","year":"2023"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900053"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2013.2274193"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref61","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2025.103086"},{"key":"ref63","volume-title":"CIC-DDoS2019 dataset","author":"Sharafaldin","year":"2025"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11197149\/11098515.pdf?arnumber=11098515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:55:32Z","timestamp":1760032532000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11098515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":63,"journal-issue":{"issue":"20"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3590966","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]}}}