{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:49:52Z","timestamp":1764960592807,"version":"3.46.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB2501204"],"award-info":[{"award-number":["2021YFB2501204"]}]},{"name":"Suzhou Science and Technology Plan - Key Technologies of Scenarios Generation and Application for Automated Driving Safety Evaluation","award":["SYG202309"],"award-info":[{"award-number":["SYG202309"]}]},{"name":"XJTLU AI University Research Centre, Jiangsu Province Engineering Research Centre of Data Science and Cognitive Computation at XJTLU, and SIP AI innovation platform","award":["YZCXPT2022103"],"award-info":[{"award-number":["YZCXPT2022103"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tnsm.2025.3603630","type":"journal-article","created":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:09:44Z","timestamp":1756404584000},"page":"6097-6111","source":"Crossref","is-referenced-by-count":0,"title":["Securing VNDN With Multi-Indicator Intrusion Detection Approach Against the IFA Threat"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7363-9695","authenticated-orcid":false,"given":"Wenjun","family":"Fan","sequence":"first","affiliation":[{"name":"School of Engineering and Technology, University of Washington, Tacoma, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7431-6257","authenticated-orcid":false,"given":"Na","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Information and Engineering, Chang&#x2019;an University, Xi&#x2019;an, China"}]},{"given":"Junhui","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Engineering, Chang&#x2019;an University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6611-5438","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Liverpool, Liverpool, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4512-052X","authenticated-orcid":false,"given":"Yifan","family":"Dai","sequence":"additional","affiliation":[{"name":"Suzhou Automotive Research Institute, Tsinghua University, Suzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0578-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.01.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0691-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2945784"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3038924"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900318"},{"key":"ref8","first-page":"1273","article-title":"Hall spoofing: A non-invasive DoS attack on grid-tied solar inverter","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Barua"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3152937"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09539-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.061411.00019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3408-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2558650"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2017.1363202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2021.1957029"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976609"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800350"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000368"},{"key":"ref19","article-title":"An identity-based batch verification scheme for VANETs based on ring signature with efficient revocation","author":"Liu","year":"2021","journal-title":"arXiv:2103.07653"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s22093190"},{"key":"ref22","first-page":"1","article-title":"A comparison of communication mechanisms in vehicular edge computing","volume-title":"Proc. 3rd USENIX Workshop Hot Topics Edge Comput. (HotEdge)","author":"Liu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1693\/1\/012029"},{"issue":"4","key":"ref24","first-page":"97","article-title":"A comparative study of tree-based and mesh-based overlay p2p media streaming","volume":"8","author":"Goh","year":"2013","journal-title":"Int. J. Multimedia Ubiquitous Eng."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2021.01.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4612"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184304"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3102969"},{"volume-title":"NDN packet format specification v0.3","year":"2023","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS50601.2020.9342837"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.80"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6142-6_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3106"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.08.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.01.006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3342901"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom63139.2024.00216"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68606-1_12"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12042"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FIT47737.2019.00053"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8847146"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2939371"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC51865.2021.9591714"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2899247"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170763"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2020.103966"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3121001"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11278396\/11143593.pdf?arnumber=11143593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:38:18Z","timestamp":1764959898000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":48,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3603630","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}