{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:54Z","timestamp":1750309374938,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1145\/3686397.3686406","type":"proceedings-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T04:28:51Z","timestamp":1732595331000},"page":"50-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber-Threat-Intelligence: Detection of Selective Packet Drops and Fake Packet Attacks in Opportunistic Networks (DOSFAN)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0086-9892","authenticated-orcid":false,"given":"Waqar","family":"Khalid","sequence":"first","affiliation":[{"name":"Department of computer Science, Institute of Management Sciences, Peshawar, KPK, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2941-9780","authenticated-orcid":false,"given":"Naveed","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of computer Science, Prince Sultan University, Riyadh, Riyadh, KSA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6311-027X","authenticated-orcid":false,"given":"Yasir","family":"Javed","sequence":"additional","affiliation":[{"name":"Department of computer Science, Prince Sultan University, Riyadh, Riyadh, KSA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7424-4452","authenticated-orcid":false,"given":"Arshad","family":"Alam","sequence":"additional","affiliation":[{"name":"Department of Horticulture, University of Agriculture, Peshawar, KPK, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3255-4318","authenticated-orcid":false,"given":"Muhammad","family":"Arshad","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"e_1_3_3_1_2_2","first-page":"1608","volume-title":"Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on","author":"Alajeely Majeed","year":"2014","unstructured":"Majeed Alajeely, Robin Doss, et\u00a0al. 2014. Defense against packet dropping attacks in opportunistic networks. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on. IEEE, 1608\u20131613."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.86"},{"key":"e_1_3_3_1_4_2","first-page":"1","volume-title":"Communication Systems and Networks (COMSNETS), 2016 8th International Conference on","author":"Alajeely Majeed","year":"2016","unstructured":"Majeed Alajeely, Robin Doss, et\u00a0al. 2016. Establishing trust relationships in OppNets using Merkle trees. In Communication Systems and Networks (COMSNETS), 2016 8th International Conference on. IEEE, 1\u20136."},{"key":"e_1_3_3_1_5_2","first-page":"1","volume-title":"Computer Science and Software Engineering (JCSSE), 2016 13th International Joint Conference on","author":"Alajeely Majeed","year":"2016","unstructured":"Majeed Alajeely, Robin Doss, et\u00a0al. 2016. Reputation based malicious node detection in OppNets. In Computer Science and Software Engineering (JCSSE), 2016 13th International Joint Conference on. IEEE, 1\u20136."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2014.15"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Majeed Alajeely Robin Doss Vicky Mak-Hau et\u00a0al. 2017. Defense against packet collusion attacks in opportunistic networks. Computers & Security 65 (2017) 269\u2013282.","DOI":"10.1016\/j.cose.2016.12.001"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Muhammad Arshad Zahid Ullah Muhammad Khalid Naveed Ahmad Waqar Khalid Duri Shahwar and Yue Cao. 2018. Beacon trust management system and fake data detection in vehicular ad-hoc networks. IET Intelligent Transport Systems 13 5 (2018) 780\u2013788.","DOI":"10.1049\/iet-its.2018.5117"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Cossi\u00a0Blaise Avoussoukpo Taiwo\u00a0Blessing Ogunseyi and Marius Tchenagnon. 2021. Securing and facilitating communication within opportunistic networks: A holistic survey. IEEE access 9 (2021) 55009\u201355035.","DOI":"10.1109\/ACCESS.2021.3071309"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Waqar Khalid Naveed Ahmad Suleman Khan Najam\u00a0U. Saquib Muhammad Arshad and Duri Shahwar. 2023. FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks. IEEE Access 11 (2023) 4549\u20134573. 10.1109\/ACCESS.2023.3235900","DOI":"10.1109\/ACCESS.2023.3235900"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Waqar Khalid Naveed Ahmed Muhammad Khalid Aziz\u00a0Ud Din Aurangzeb Khan and Muhammad Arshad. 2019. Frid: Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks. IEEE Access 7 (2019) 83740\u201383760.","DOI":"10.1109\/ACCESS.2019.2924587"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Waqar Khalid Naveed Ahmed Suleman Khan Zahid Ullah and Yasir Javed. 2023. Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks. IEEE Access 11 (2023) 75628\u201375656. 10.1109\/ACCESS.2023.3297439","DOI":"10.1109\/ACCESS.2023.3297439"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Waqar Khalid Zahid Ullah Naveed Ahmed Yue Cao Muhammad Khalid Muhammad Arshad Farhan Ahmad and Haitham Cruickshank. 2018. A taxonomy on misbehaving nodes in delay tolerant networks. computers & security 77 (2018) 442\u2013471.","DOI":"10.1016\/j.cose.2018.04.015"},{"key":"e_1_3_3_1_15_2","unstructured":"Adnan\u00a0Shahid Khan Yasir Javed Johari Abdullah and Kartinah Zen. 2021. Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS). Journal of Ambient Intelligence and Humanized Computing (2021) 1\u201318."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Adnan\u00a0Shahid Khan Yasir Javed Rashad\u00a0Mahmood Saqib Zeeshan Ahmad Johari Abdullah Kartinah Zen Irshad\u00a0Ahmed Abbasi and Nayeem\u00a0Ahmad Khan. 2022. Lightweight multifactor authentication scheme for nextgen cellular networks. IEEE Access 10 (2022) 31273\u201331288.","DOI":"10.1109\/ACCESS.2022.3159686"},{"key":"e_1_3_3_1_17_2","first-page":"368","volume-title":"Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30\u2013December 2, 2022, Proceedings","author":"Leite Cristoffer","year":"2023","unstructured":"Cristoffer Leite, Jerry den Hartog, Daniel Ricardo\u00a0dos Santos, and Elisa Costante. 2023. Actionable Cyber Threat Intelligence for Automated Incident Response. In Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30\u2013December 2, 2022, Proceedings. Springer, 368\u2013385."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2019.8711621"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99329-0_14"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Thi Ngoc\u00a0Diep Pham Chai\u00a0Kiat Yeo Naoto Yanai and Toru Fujiwara. 2018. Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. IEEE Transactions on Vehicular Technology 67 1 (2018) 795\u2013808.","DOI":"10.1109\/TVT.2017.2748345"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Rashad\u00a0Mahmood Saqib Adnan\u00a0Shahid Khan Yasir Javed Shakil Ahmad Kashif Nisar Irshad\u00a0A Abbasi Muhammad\u00a0Reazul Haque and Azlina\u00a0Ahmadi Julaihi. 2022. Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security. Intelligent Automation & Soft Computing 32 3 (2022).","DOI":"10.32604\/iasc.2022.021786"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Bam\u00a0Bahadur Sinha and R Dhanalakshmi. 2022. Recent advancements and challenges of Internet of Things in smart agriculture: A survey. Future Generation Computer Systems 126 (2022) 169\u2013184.","DOI":"10.1016\/j.future.2021.08.006"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Lionel Touseau and Nicolas Le\u00a0Sommer. 2019. Contribution of the web of things and of the opportunistic computing to the smart agriculture: A practical experiment. Future Internet 11 2 (2019) 33.","DOI":"10.3390\/fi11020033"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Abbas Yazdinejad Behrouz Zolfaghari Amin Azmoodeh Ali Dehghantanha Hadis Karimipour Evan Fraser Arthur\u00a0G Green Conor Russell and Emily Duncan. 2021. A review on security of smart farming and precision agriculture: Security aspects attacks threats and countermeasures. Applied Sciences 11 16 (2021) 7518.","DOI":"10.3390\/app11167518"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Yinghai Zhou Yitong Ren Ming Yi Yanjun Xiao Zhiyuan Tan Nour Moustafa and Zhihong Tian. 2023. CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships. IEEE Transactions on Sustainable Computing (2023).","DOI":"10.1109\/TSUSC.2023.3240411"}],"event":{"name":"ICISDM 2024: 2024 the 8th International Conference on Information System and Data Mining","acronym":"ICISDM 2024","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 2024 8th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686397.3686406","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686397.3686406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:22Z","timestamp":1750291582000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686397.3686406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":24,"alternative-id":["10.1145\/3686397.3686406","10.1145\/3686397"],"URL":"https:\/\/doi.org\/10.1145\/3686397.3686406","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]},"assertion":[{"value":"2024-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}