{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:24:54Z","timestamp":1742394294127,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9825115","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T19:32:34Z","timestamp":1658259154000},"page":"342-347","source":"Crossref","is-referenced-by-count":20,"title":["Transfer Learning-Driven Intrusion Detection for Internet of Vehicles (IoV)"],"prefix":"10.1109","author":[{"given":"Yazan","family":"Otoum","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa,Canada"}]},{"given":"Yue","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa,Canada"}]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa,Canada"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373868"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.08.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000476"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.103738"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2945133"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00382-x"},{"key":"ref19","first-page":"69","article-title":"Detecting and preventing ip-spoofed distributed dos attacks","volume":"7","author":"chen","year":"2008","journal-title":"Int J Netw Secur"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000421"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3144785"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000428"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3406093"},{"journal-title":"U s - connected vehicles 2030","year":"2021","author":"placek","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.130"},{"key":"ref20","first-page":"479","article-title":"A detailed analysis of cicids2017 dataset for designing intrusion detection systems","volume":"7","author":"panigrahi","year":"2018","journal-title":"International Journal of Engineering & Technology"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2022,5,30]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09825115.pdf?arnumber=9825115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T19:59:15Z","timestamp":1659988755000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9825115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9825115","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}