{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T12:00:58Z","timestamp":1766059258825,"version":"3.48.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014438","name":"Business Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014438","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/pimrc62392.2025.11275148","type":"proceedings-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T18:33:25Z","timestamp":1765564405000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["DiBSeLO: Distributed IoT Blacklisting and Server Location Optimization in Rayleigh Fading Channels"],"prefix":"10.1109","author":[{"given":"Ozan","family":"Tarlan","sequence":"first","affiliation":[{"name":"Ozyegin University,Department of Computer Science,Istanbul,Turkey"}]},{"given":"Ilg\u0131n","family":"\u015eafak","sequence":"additional","affiliation":[{"name":"R&#x0026;D Center, Fibabanka,Istanbul,Turkey"}]},{"given":"K\u00fcbra","family":"Kalkan","sequence":"additional","affiliation":[{"name":"Ozyegin University,Department of Computer Science,Istanbul,Turkey"}]}],"member":"263","reference":[{"volume-title":"Multipath Fading","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/1291.32020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"volume-title":"Wi-Fi Signal Strength: What Is a Good Signal And How Do You Measure It","key":"ref4"},{"volume-title":"BER for BPSK in Rayleigh channel","key":"ref5"},{"key":"ref6","first-page":"947","article-title":"Blackhole Detection in 6LoWPAN Based IoT: An Anomaly Based Approach","volume-title":"Proc. TENCON","author":"Patel"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc48107.2020.9148242"},{"key":"ref8","first-page":"122","article-title":"IoT DDoS Attack Detection System Based on Machine Learning","volume-title":"Proc. EuCNC","author":"Chen"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/globecom38437.2019.9014300"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/mass.2018.00047"},{"key":"ref11","first-page":"84","article-title":"DiBLIoT: A Distributed Blacklisting Protocol for IoT Device Classification Using Hashgraph","volume-title":"Proc. ICOIN","author":"Tarlan"},{"volume-title":"Hedera Consensus Service","key":"ref12"},{"volume-title":"Packet Error Rate","key":"ref13"},{"key":"ref14","first-page":"36","article-title":"Detecting Volumetric Attacks on IoT via SDN Monitoring of MUD Activity","volume-title":"Proc. ACM SOSR","author":"Hamza"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/radioelek.2011.5936478"},{"key":"ref16","article-title":"Hashgraph Consensus: Fair, Fast, BFT","volume-title":"Swirlds","author":"Baird","year":"2016"},{"volume-title":"Genetic Algorithm","key":"ref17"},{"volume-title":"Simulated Annealing","key":"ref18"},{"volume-title":"K-means","key":"ref19"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/NCA.2019.8935007","article-title":"Anomalous Communications Detection in IoT Using Sparse Autoencoders","volume-title":"Proc. IEEE NCA","author":"Shahid"}],"event":{"name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2025,9,1]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2025,9,4]]}},"container-title":["2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11274530\/11274549\/11275148.pdf?arnumber=11275148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T11:57:37Z","timestamp":1766059057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11275148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/pimrc62392.2025.11275148","relation":{},"subject":[],"published":{"date-parts":[[2025,9,1]]}}}