{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:47:11Z","timestamp":1751521631321,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,25]]},"DOI":"10.1109\/smartnets58706.2023.10215881","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T13:32:28Z","timestamp":1692711148000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Collaborative DDoS Attack Defense for OTA Updates in CAVs using Hyperledger Fabric Blockchain"],"prefix":"10.1109","author":[{"given":"Sadia","family":"Yeasmin","sequence":"first","affiliation":[{"name":"Western University,Department of Computer Science,London,Canada,N6A 5B7"}]},{"given":"Anwar","family":"Haque","sequence":"additional","affiliation":[{"name":"Western University,Department of Computer Science,London,Canada,N6A 5B7"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"crossref","first-page":"494","DOI":"10.3390\/electronics11030494","article-title":"Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)","volume":"11","author":"ali","year":"2022","journal-title":"Electronics"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.3390\/su15032133","article-title":"Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City","volume":"15","author":"gupta","year":"2023","journal-title":"Sustainability"},{"year":"0","key":"ref34"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/su141912409"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s22031094"},{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631249"},{"key":"ref33","first-page":"1","article-title":"A Flow Based Anomaly Detection Approach with Feature Selection Method Against DDoS Attacks in SDNs","author":"elsayed","year":"2022","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625249"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app13053183"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"5456","DOI":"10.1016\/j.jksuci.2021.05.005","article-title":"eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles","volume":"34","author":"anam","year":"2022","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"109394","DOI":"10.1016\/j.comnet.2022.109394","article-title":"Secure over-the-air software update for connected vehicles","volume":"218","author":"amrita","year":"2022","journal-title":"Computer Networks"},{"year":"0","key":"ref17"},{"year":"0","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2020.3031358"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959047"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.3390\/s22041494","article-title":"Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey","volume":"22","author":"albasheer","year":"2022","journal-title":"SENSORS"},{"key":"ref23","first-page":"1","article-title":"Signature-Over-The-Air with Transfer Learning IDS for Intelligent Connected Vehicles (ICV)","author":"yazan","year":"2021","journal-title":"2021 IEEE Globecom Workshops (GC Wkshps)"},{"key":"ref26","article-title":"Adaptive Neural Network Finite- Time Control for Nonlinear Cyber-Physical Systems with External Disturbances under Malicious Attacks","author":"zhaoyang","year":"2022","journal-title":"Neurocomputing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93646-4_5"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"226","DOI":"10.3390\/fi11110226","article-title":"Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets","volume":"11","author":"spathoulas","year":"2019","journal-title":"Future Internet"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"12328","DOI":"10.1109\/TITS.2021.3113675","article-title":"Change Point Models for Real-Time Cyber Attack Detection in Connected Vehicle Environment","volume":"23","author":"gurcan","year":"2022","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"6806","DOI":"10.3390\/s22186806","article-title":"DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology","volume":"22","author":"ibrahim","year":"2022","journal-title":"SENSORS"},{"year":"0","key":"ref28"},{"key":"ref27","article-title":"Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network","author":"wu","year":"2020","journal-title":"IEEE Access"},{"year":"0","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885769"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3357613.3357631"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"153701","DOI":"10.1109\/ACCESS.2021.3125521","article-title":"A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues","volume":"9","author":"sagheer","year":"2021","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.dcan.2020.04.007","article-title":"Attacks and defences on intelligent connected vehicles: a survey","volume":"6","author":"mahdi","year":"2020","journal-title":"Digital Communications and Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3337791"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","article-title":"Securing Vehicular Communications","volume":"13","author":"maxim","year":"2006","journal-title":"IEEE Wireless Communications"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1016\/j.aej.2015.07.011","article-title":"Survey on Security Issues in Vehicular Ad Hoc Networks","volume":"54","author":"bassem","year":"2015","journal-title":"Alexandria Engineering Journal"}],"event":{"name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","start":{"date-parts":[[2023,7,25]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,7,27]]}},"container-title":["2023 International Conference on Smart Applications, Communications and Networking (SmartNets)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10215379\/10215514\/10215881.pdf?arnumber=10215881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T13:51:59Z","timestamp":1694440319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10215881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/smartnets58706.2023.10215881","relation":{},"subject":[],"published":{"date-parts":[[2023,7,25]]}}}