{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:42:35Z","timestamp":1760143355041,"version":"build-2065373602"},"reference-count":6,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Europe Horizon NGIsargasso","award":["101092887"],"award-info":[{"award-number":["101092887"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>There is an urgent need to introduce security-by-design in networks [...]<\/jats:p>","DOI":"10.3390\/jsan13010011","type":"journal-article","created":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T08:44:08Z","timestamp":1706777048000},"page":"11","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Featured Papers on Network Security and Privacy"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1489-5138","authenticated-orcid":false,"given":"Jordi","family":"Mongay Batalla","sequence":"first","affiliation":[{"name":"Institute of Telecommunications and Cybersecurity, Warsaw University of Technology, 00-665 Warsaw, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Antony, S.N.F.M.A., and Bahari, M.F.A. (2023). Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. J. Sens. Actuator Netw., 12.","DOI":"10.3390\/jsan12010015"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Aljabri, M., Alahmadi, A.A., Mohammad, R.M.A., Alhaidari, F., Aboulnour, M., Alomari, D.M., and Mirza, S. (2023). Machine Learning-Based Detection for Unauthorized Access to IoT Devices. J. Sens. Actuator Netw., 12.","DOI":"10.3390\/jsan12020027"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Almuhaideb, A.M., Aslam, N., Alabdullatif, A., Altamimi, S., Alothman, S., Alhussain, A., Aldosari, W., Alsunaidi, S.J., and Alissa, K.A. (2022). Homoglyph Attack Detection Model Using Machine Learning and Hash Function. J. Sens. Actuator Netw., 11.","DOI":"10.3390\/jsan11030054"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Almuhaideb, A.M., and Algothami, S.S. (2022). Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. J. Sens. Actuator Netw., 11.","DOI":"10.3390\/jsan11020028"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Mannix, K., Gorey, A., O\u2019Shea, D., and Newe, T. (2022). Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them. J. Sens. Actuator Netw., 11.","DOI":"10.3390\/jsan11030043"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Alzahrani, R.A., and Aljabri, M. (2023). AI-Based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions. J. Sens. Actuator Netw., 12.","DOI":"10.3390\/jsan12010004"}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/13\/1\/11\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:52:52Z","timestamp":1760104372000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/13\/1\/11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,1]]},"references-count":6,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["jsan13010011"],"URL":"https:\/\/doi.org\/10.3390\/jsan13010011","relation":{},"ISSN":["2224-2708"],"issn-type":[{"type":"electronic","value":"2224-2708"}],"subject":[],"published":{"date-parts":[[2024,2,1]]}}}