{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T21:20:35Z","timestamp":1774473635795,"version":"3.50.1"},"reference-count":232,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB4404404"],"award-info":[{"award-number":["2023YFB4404404"]}]},{"name":"Key Research and Development Programme of Zhejiang Province","award":["2024C01012"],"award-info":[{"award-number":["2024C01012"]}]},{"name":"Key Technologies Research and Development Program of Jiangsu","award":["BE2023005-2"],"award-info":[{"award-number":["BE2023005-2"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["92373205"],"award-info":[{"award-number":["92373205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62374146"],"award-info":[{"award-number":["62374146"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2023YFB3107402"],"award-info":[{"award-number":["2023YFB3107402"]}]},{"name":"Chinese Institute of Electronics (CIE)-Smartchip Research Fund","award":["2023-004"],"award-info":[{"award-number":["2023-004"]}]},{"name":"HUAWEI\u2019s Artificial Intelligence (AI) Hundred Schools Program and was carried out using the Ascend AI Technology Stack"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/comst.2026.3674515","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:18:15Z","timestamp":1773692295000},"page":"5345-5378","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection and Prevention for Intra- and Inter-Vehicle Networks: A Comprehensive Survey"],"prefix":"10.1109","volume":"28","author":[{"given":"Aya","family":"El-Fatyany","sequence":"first","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2872-0734","authenticated-orcid":false,"given":"Jabar","family":"Mahmood","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5769-6040","authenticated-orcid":false,"given":"Michael Abebe","family":"Berwo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2263-5643","authenticated-orcid":false,"given":"Xiaohang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5230-3749","authenticated-orcid":false,"given":"Li","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"given":"Qiang","family":"Xue","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2018ANI0004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29673-4_8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4271\/2000-01-0153"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3399211"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3227079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3004275"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119771"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3222486"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100639"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3570954"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908074"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3137790"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.053037"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01508-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref21","first-page":"99","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Valasek","year":"2013","journal-title":"Tech. White Paper"},{"key":"ref22","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. Conf. USENIX Secur. Symp.","author":"Checkoway"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4271\/2023-01-5050"},{"key":"ref24","first-page":"1","article-title":"An introduction to the canard toolkit","volume-title":"Proc. Conf. Blackhat","author":"Evenchick"},{"issue":"1","key":"ref25","first-page":"16","article-title":"Free-fall: Hacking Tesla from wireless to can bus","volume":"25","author":"Nie","year":"2017","journal-title":"Briefing, Black Hat USA"},{"issue":"S","key":"ref26","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Blackhat"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00093"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833886"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528536"},{"key":"ref30","first-page":"1047","article-title":"The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR\/EDR","volume-title":"Proc. Conf. USENIX Secur. Symp.","author":"Antonioli"},{"key":"ref31","first-page":"232","article-title":"A security analysis of an in-vehicle infotainment and app platform","volume-title":"Proc. Conf. USENIX Offensive Technol.","author":"Mazloom"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_24"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3424518"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23047"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103091"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MSN57253.2022.00072"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3295695"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9569703"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333756"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2024.23043"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.004"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23035"},{"key":"ref50","first-page":"2021","article-title":"Syncan dataset","volume":"1","author":"Hanselmann","year":"2020","journal-title":"Retrieved"},{"key":"ref51","first-page":"411","article-title":"TOW-IDS: Automotive Ethernet intrusion dataset (2022)","volume":"18","author":"Han","year":"2022","journal-title":"IEEE DataPort"},{"key":"ref52","article-title":"Automotive Ethernet intrusion dataset","volume":"29","author":"Jeong","year":"2021","journal-title":"IEEE Dataport"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3283995"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151377"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690267"},{"key":"ref69","first-page":"6911","article-title":"RIDAS: Real-time identification of attack sources on controller area networks","volume-title":"Proc. Conf. USENIX Secur. Symp.","author":"Shin"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103436"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100652"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975893"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3296002"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120596"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102448"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3323622"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102717"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9861034"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103190"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102289"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/VNC57357.2023.10136285"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2024.23056"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121493"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3202539"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103712"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3566132"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3236820"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3327026"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102957"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets61466.2024.10577640"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3530155"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3297444"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122181"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-10200-4"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3540198"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3055351"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3015143"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102748"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100520"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2023.23088"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3296705"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860358"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3383449"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103166"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3393122"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3146024"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3286611"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3306345"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3294349"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3324949"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103548"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3221893"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115524"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224976"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.08.001"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103646"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103567"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448878"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.015"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP64064.2024.10711086"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3136706"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2015.060414"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.08.010"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3236794"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ASIANCON58793.2023.10270286"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI52147.2023.10371867"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120626"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICAISS55157.2022.10011115"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001280"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/eIT60633.2024.10609919"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00234"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417568"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3326384"},{"key":"ref140","first-page":"1","article-title":"MixMatch: A holistic approach to semi-supervised learning","volume-title":"Proc. Conf. Neural Inf. Process. Syst.","author":"Berthelot"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT55814.2023.10060872"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3407709"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.065"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3117028"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437232"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT62343.2024.00085"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/math13071088"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108532"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.019121"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-021-01323-7"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.033842"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3328020"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00871-x"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761300"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473606"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC60852.2024.10690016"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081757"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279212"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.3390\/math10081267"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271768"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279368"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.011"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ATC52653.2021.9598224"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.42"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03516-0"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.102"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1300-5"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.32985\/ijeces.15.2.2"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56549-1_12"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905633"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06158-6_10"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4708201"},{"key":"ref174","article-title":"WiFi anomaly behavior analysis based intrusion detection using online learning","volume-title":"International Foundation for Telemetering","author":"Torrres","year":"2021"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010544"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10151765"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2018.8612809"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA50499.2020.9316514"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3318181"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3027057"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3151712"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3333843"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3136147"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3196642"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892961"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/MSN60784.2023.00059"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3545782"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022778"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/gcwkshps52748.2021.9682168"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/QICAR61538.2024.10496659"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2986585"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00562-z"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.003"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106555"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3242291"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2402166"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3090400"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3038834"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3186921"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271355"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3246466"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3459033"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3337136"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3273234"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3392470"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3236699"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3558837"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044961"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3305556"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981934"},{"key":"ref211","first-page":"489","article-title":"Conventional and hybrid encryption schemes for security against attacks in vehicular adhoc network","volume-title":"Proc. 4th Int. Conf. Comput. Commun. Technol. (ICCCT)","author":"Kothai"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135016"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3340259"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891105"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981127"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3224466"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2839979"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3409361"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3194008"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3009382"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265959"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3308601"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3400320"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2024.100832"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.038029"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909004"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3176755"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3288930"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3412106"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3238307"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud55982.2022.00010"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/ECICE55674.2022.10042899"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11321210\/11435268.pdf?arnumber=11435268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:59:45Z","timestamp":1774468785000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11435268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":232,"URL":"https:\/\/doi.org\/10.1109\/comst.2026.3674515","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}