{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:32:55Z","timestamp":1773520375644,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10207-023-00705-y","type":"journal-article","created":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T10:01:22Z","timestamp":1685872882000},"page":"1547-1566","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-5314-1291","authenticated-orcid":false,"given":"Ngoc T.","family":"Luong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-1798-4926","authenticated-orcid":false,"given":"Doan","family":"Hoang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,4]]},"reference":[{"key":"705_CR1","doi-asserted-by":"publisher","first-page":"6194","DOI":"10.1109\/TKDE.2022.3153711","volume":"35","author":"H Liu","year":"2023","unstructured":"Liu, H., Li, Y., Fu, Y., et al.: Polestar++: an intelligent routing engine for national-wide public transportation. IEEE Trans. Knowl. Data Eng. 35, 6194\u20136208 (2023). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TKDE.2022.3153711","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"705_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s00778-022-00748-y","volume":"32","author":"H Liu","year":"2022","unstructured":"Liu, H., Han, J., Fu, Y., et al.: Unified route representation learning for multi-modal transportation recommendation with spatiotemporal pre-training. VLDB J. 32, 325\u2013342 (2022). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s00778-022-00748-y","journal-title":"VLDB J."},{"key":"705_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31368-4_6","volume-title":"Vehicular Ad-hoc Networks(VANETs): Capabilities, Challenges in Context-Aware Processing and Communication Gateway. Autonomous and Intelligent Systems (AIS 2012)","author":"L Nassar","year":"2012","unstructured":"Nassar, L., Jundi, A., Golestan, K., et al.: Vehicular Ad-hoc Networks(VANETs): Capabilities, Challenges in Context-Aware Processing and Communication Gateway. Autonomous and Intelligent Systems (AIS 2012). Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (2012). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-31368-4_6"},{"issue":"3","key":"705_CR4","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MPRV.2009.2","volume":"3","author":"H Jeroen","year":"2004","unstructured":"Jeroen, H., Ingrid, M., Bart, D., Piet, D.: An overview of Mobile Ad hoc Networks: applications and challenges. J. Commun. Netw. 3(3), 60\u201366 (2004). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/MPRV.2009.2","journal-title":"J. Commun. Netw."},{"key":"705_CR5","doi-asserted-by":"publisher","unstructured":"Amani A.S., Shcherbakov, M.: A survey on routing protocols in Vehicular Ad hoc Networks. In: 9th International Conference on Information, Intelligence, Systems and Applications (IISA), pp. 1\u20138. IEEE, Zakynthos, Greece (2018). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/IISA.2018.8633700","DOI":"10.1109\/IISA.2018.8633700"},{"key":"705_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/971684","volume":"2013","author":"BE Bilgin","year":"2013","unstructured":"Bilgin, B.E., Gungor, C.V.: Performance comparison of IEEE 802.11p and IEEE 802.11b for vehicle-to-vehicle communications in highway, rural, and urban areas. Int. J. Veh. Technol 2013, 1\u201310 (2013). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1155\/2013\/971684","journal-title":"Int. J. Veh. Technol"},{"issue":"2","key":"705_CR7","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1016\/j.comnet.2011.10.011","volume":"56","author":"E Alotaibi","year":"2012","unstructured":"Alotaibi, E., Mukherjee, B.: A survey on routing algorithms for Wireless Ad-hoc and Mesh networks. Comput. Netw. 56(2), 940\u2013965 (2012). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2011.10.011","journal-title":"Comput. Netw."},{"key":"705_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33\u201350 (2017). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.adhoc.2017.03.006","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"705_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-1-4","volume":"1","author":"FH Tseng","year":"2011","unstructured":"Tseng, F.H., Chou, L., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. HCIS 1(4), 1\u201316 (2011). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1186\/2192-1962-1-4","journal-title":"HCIS"},{"key":"705_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jnca.2015.04.008","volume":"54","author":"LS Casado","year":"2015","unstructured":"Casado, L.S., Fern\u00e1ndez, G.M., et al.: Identification of contamination zones for Sinkhole detection in MANETs. J. Netw. Comput. Appl. 54, 62\u201377 (2015). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jnca.2015.04.008","journal-title":"J. Netw. Comput. Appl."},{"key":"705_CR11","doi-asserted-by":"publisher","unstructured":"Gao, X., Chen, W.: A novel Gray hole attack detection scheme for Mobile Ad-hoc Networks. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 209\u2013214. IEEE, Dalian, China (2007). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/NPC.2007.88","DOI":"10.1109\/NPC.2007.88"},{"issue":"7","key":"705_CR12","doi-asserted-by":"publisher","first-page":"4115","DOI":"10.1007\/s11276-018-1734-z","volume":"25","author":"TT Vo","year":"2019","unstructured":"Vo, T.T., Luong, N.T., Hoang, D.: MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wirel. Netw. 25(7), 4115\u20134132 (2019). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11276-018-1734-z","journal-title":"Wirel. Netw."},{"issue":"5","key":"705_CR13","doi-asserted-by":"publisher","first-page":"832","DOI":"10.6633\/IJNS.201709.19(5).21","volume":"19","author":"NT Luong","year":"2017","unstructured":"Luong, N.T., Vo, T.T.: Whirlwind: A new method to attack Routing Protocol in Mobile Ad hoc Network. Int. J. Netw. Secur. 19(5), 832\u2013838 (2017). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.6633\/IJNS.201709.19(5).21","journal-title":"Int. J. Netw. Secur."},{"key":"705_CR14","doi-asserted-by":"publisher","unstructured":"Andrew, F., Yudha, T.A., Ahmad, S., et al.: Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (Vehicular Ad-Hoc Network). In: 8th International Conference on Cyber and IT Service Management (CITSM), pp. 1\u20135. IEEE, Pangkal, Indonesia (2020). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CITSM50537.2020.9268789","DOI":"10.1109\/CITSM50537.2020.9268789"},{"key":"705_CR15","doi-asserted-by":"publisher","first-page":"199618","DOI":"10.1109\/ACCESS.2020.3034327","volume":"8","author":"Z Hassan","year":"2020","unstructured":"Hassan, Z., Mehmood, A., et al.: Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access 8, 199618\u2013199628 (2020). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ACCESS.2020.3034327","journal-title":"IEEE Access"},{"key":"705_CR16","doi-asserted-by":"publisher","unstructured":"Hortelano, J., Ruiz J.C., Manzoni, P.: Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops, pp. 1\u20135. IEEE, Cape Town, South Africa (2010). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ICCW.2010.5503946","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"705_CR17","doi-asserted-by":"publisher","unstructured":"Cai, J., Yi, P., et al.: An adaptive approach to detecting black and gray hole attacks in Ad Hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 775\u2013780. IEEE, Perth, WA, Australia (2010). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/AINA.2010.143","DOI":"10.1109\/AINA.2010.143"},{"issue":"2","key":"705_CR18","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s11042-011-0789-y","volume":"66","author":"A Daeinabi","year":"2013","unstructured":"Daeinabi, A., Rahbar, A.G.: Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. Multimed. Tools Appl. 66(2), 325\u2013338 (2013). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-011-0789-y","journal-title":"Multimed. Tools Appl."},{"key":"705_CR19","doi-asserted-by":"publisher","unstructured":"Kadam, M., Limkar, S.: Performance investigation of DMV (Detecting Malicious Vehicle) and D &PMV (Detection and prevention of misbehave\/malicious vehicles): future road map. In: International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. Advances in Intelligent Systems and Computing, Vol 247. Springer, Cham (2013). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/978-3-319-02931-3_43","DOI":"10.1007\/978-3-319-02931-3_43"},{"issue":"3","key":"705_CR20","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1007\/s11277-013-1443-y","volume":"75","author":"OA Wahab","year":"2014","unstructured":"Wahab, O.A., Otrok, H., Mourad, A.: A dempster-shafer based tit-for-tat strategy to regulate the cooperation in VANET using QoS-OLSR protocol. Wirel. Pers. Commun. Vol. 75(3), 1635\u20131667 (2014). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11277-013-1443-y","journal-title":"Wirel. Pers. Commun. Vol."},{"key":"705_CR21","doi-asserted-by":"publisher","unstructured":"Baiad, R., Otrok, H., et al.: Cooperative cross layer detection for blackhole attack in VANET-OLSR. In: International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 863\u2013868. IEEE, Nicosia, Cyprus (2014). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/IWCMC.2014.6906469","DOI":"10.1109\/IWCMC.2014.6906469"},{"key":"705_CR22","doi-asserted-by":"publisher","unstructured":"Gruebler, A., Maier, K.D.M., Alheeti, K.M.A.: An intrusion detection system against black hole attacks on the communication network of self-driving cars. In: Sixth International Conference on Emerging Security Technologies (EST), pp. 86\u201391. IEEE, Braunschweig, Germany (2015). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/EST.2015.10","DOI":"10.1109\/EST.2015.10"},{"key":"705_CR23","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.procs.2015.04.122","volume":"48","author":"V Kumar","year":"2015","unstructured":"Kumar, V., Kumar, R.: An adaptive approach for detection of blackhole attack in mobile Ad hoc network. Procedia Comput. Sci. 48, 472\u2013479 (2015). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.procs.2015.04.122","journal-title":"Procedia Comput. Sci."},{"key":"705_CR24","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.procs.2015.06.010","volume":"54","author":"A Dhaka","year":"2015","unstructured":"Dhaka, A., Nandal, A., Dhaka, R.S.: Gray and black hole attack identification using control packets in MANETs. Procedia Comput. Sci. 54, 83\u201391 (2015). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.procs.2015.06.010","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"705_CR25","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s10776-018-0418-z","volume":"26","author":"P Ndajah","year":"2019","unstructured":"Ndajah, P., Matine, A.O., Hounkonnou, M.N.: Black hole attack prevention in wireless peer-to-peer networks: a new strategy. Int. J. Wirel. Inf. Netw. 26(1), 48\u201360 (2019). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10776-018-0418-z","journal-title":"Int. J. Wirel. Inf. Netw."},{"issue":"5","key":"705_CR26","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1007\/s12652-018-0782-7","volume":"10","author":"T Delkesh","year":"2019","unstructured":"Delkesh, T., Jabraeil Jamali, M.A.: EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs. J. Ambient. Intell. Humaniz. Comput. 10(5), 1897\u20131914 (2019). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s12652-018-0782-7","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"705_CR27","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1007\/s11036-019-01505-2","volume":"26","author":"S Sivanesh","year":"2021","unstructured":"Sivanesh, S., Dhulipala, V.R.S.: Accurate and cognitive intrusion detection system (ACIDS): A novel black hole detection mechanism in Mobile Ad Hoc Networks. Mob. Netw. Appl. 26, 1696\u20131704 (2021). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11036-019-01505-2","journal-title":"Mob. Netw. Appl."},{"key":"705_CR28","doi-asserted-by":"publisher","unstructured":"Perkins, C.E., Park, M., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90\u2013100 (1999). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/581291.581306","DOI":"10.1145\/581291.581306"},{"issue":"1","key":"705_CR29","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.comcom.2010.08.007","volume":"34","author":"MY Su","year":"2011","unstructured":"Su, M.Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34(1), 107\u2013117 (2011). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2010.08.007","journal-title":"Comput. Commun."},{"key":"705_CR30","doi-asserted-by":"publisher","unstructured":"Jaiswal, R., Sharma, S.: A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network. In: Advance Computing Conference (IACC), 2013 IEEE 3rd International, pp. 499\u2013504. IEEE, Ghaziabad, India (2013). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/IAdCC.2013.6514276","DOI":"10.1109\/IAdCC.2013.6514276"},{"issue":"4","key":"705_CR31","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2016","unstructured":"Li, W., Song, H.: ART: an attack-resistant trust management scheme for securing vehicular Ad Hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960\u2013969 (2016). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TITS.2015.2494017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"705_CR32","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.dcan.2017.03.001","volume":"3","author":"KMA Alheeti","year":"2017","unstructured":"Alheeti, K.M.A., Gruebler, A., Maier, K.M.: Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digit. Commun. Netw. 3(3), 180\u2013187 (2017). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.dcan.2017.03.001","journal-title":"Digit. Commun. Netw."},{"key":"705_CR33","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/s11036-017-0912-z","volume":"24","author":"G Arulkumaran","year":"2019","unstructured":"Arulkumaran, G., Gnanamurthy, R.K.: Fuzzy trust approach for detecting black hole attack in mobile Adhoc network. Mob. Netw. Appl. 24, 386\u2013393 (2019). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11036-017-0912-z","journal-title":"Mob. Netw. Appl."},{"issue":"1","key":"705_CR34","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s11277-018-5824-0","volume":"102","author":"P Tyagi","year":"2018","unstructured":"Tyagi, P., Dembla, D.: Advanced secured routing algorithm of vehicular Ad-Hoc network. Wirel. Pers. Commun. 102(1), 41\u201360 (2018). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11277-018-5824-0","journal-title":"Wirel. Pers. Commun."},{"key":"705_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8814141","volume":"2021","author":"G Farahani","year":"2021","unstructured":"Farahani, G.: Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in Mobile Ad Hoc Networks. Secur. Commun. Netw. 2021, 1\u201315 (2021). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1155\/2021\/8814141","journal-title":"Secur. Commun. Netw."},{"issue":"15","key":"705_CR36","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.comcom.2014.03.019","volume":"48","author":"VFS Mota","year":"2014","unstructured":"Mota, V.F.S., Cunha, F.D., et al.: Protocols, mobility models and tools in opportunistic networks: a survey. Comput. Commun. 48(15), 5\u201319 (2014). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2014.03.019","journal-title":"Comput. Commun."},{"key":"705_CR37","doi-asserted-by":"publisher","unstructured":"Teerawat, I., Ekram, H.: Introduction to Network Simulator NS2, p. 535. Springer (2009). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/978-1-4614-1406-3. NS2 source code: https:\/\/linproxy.fan.workers.dev:443\/http\/www.isi.edu\/nsnam\/ns\/","DOI":"10.1007\/978-1-4614-1406-3"},{"issue":"1","key":"705_CR38","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s41870-017-0058-z","volume":"10","author":"KS Sanjib","year":"2018","unstructured":"Sanjib, K.S., Pankaj, K.A., Singh, P.: Modified k-NN algorithm for classification problems with improved accuracy. Int. J. Inf. Technol. 10(1), 65\u201370 (2018). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s41870-017-0058-z","journal-title":"Int. J. Inf. Technol."},{"key":"705_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/6869307","volume":"2019","author":"NT Luong","year":"2019","unstructured":"Luong, N.T., Vo, T.T., Hoang, D.: FAPRP: a machine learning approach to flooding attacks prevention routing protocol in Mobile Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2019, 1\u201317 (2019). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1155\/2019\/6869307","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"705_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03174-8","author":"NT Luong","year":"2022","unstructured":"Luong, N.T., Nguyen, A.Q., Hoang, D.: FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wirel. Netw. (2022). https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11276-022-03174-8","journal-title":"Wirel. Netw."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00705-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s10207-023-00705-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00705-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T02:11:47Z","timestamp":1695694307000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/10.1007\/s10207-023-00705-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,4]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["705"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10207-023-00705-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,4]]},"assertion":[{"value":"4 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}