{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:59:05Z","timestamp":1771520345208,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3170276","type":"journal-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T20:15:24Z","timestamp":1651176924000},"page":"1669-1683","source":"Crossref","is-referenced-by-count":39,"title":["Towards Spoofing Resistant Next Generation IoT Networks"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6959-0975","authenticated-orcid":false,"given":"Mohammad Reza","family":"Nosouhi","sequence":"first","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2127-1438","authenticated-orcid":false,"given":"Keshav","family":"Sood","sequence":"additional","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6933-0145","authenticated-orcid":false,"given":"Marthie","family":"Grobler","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-6850","authenticated-orcid":false,"given":"Robin","family":"Doss","sequence":"additional","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800663"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00201-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2927379"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1700412"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2950295"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883144"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2598184"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3071448"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694487"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561902"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948283"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601107"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2981333"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155382"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0378"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMPEM.2019.8779180"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00113"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1143-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3396870.3400010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802768"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108586"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831723"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LMWC.2018.2869288"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2017.05.008"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1049\/iet-map.2017.0815"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/technologies5040075"},{"key":"ref41","volume-title":"Ferro A6\u2013S High Frequency LTCC System, Ferro Electronic Materials","year":"2021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869411"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2017.8048566"},{"key":"ref44","volume-title":"Study on New Radio (NR) Access Technology\u2014Physical Layer Aspects\u2014Release 14, TR 38.802","year":"2021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120012"},{"key":"ref46","volume-title":"Intel Core I7-8086K Processor","year":"2022"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.27"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1038\/srep30235"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ULTSYM.2018.8580062"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2019.2900246"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600435CM"},{"key":"ref52","volume-title":"MATLAB Products and Services","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78262-1_300005"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09764730.pdf?arnumber=9764730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:57:56Z","timestamp":1705960676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9764730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3170276","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}