{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:33:14Z","timestamp":1771698794111,"version":"3.50.1"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030368074","type":"print"},{"value":"9783030368081","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36808-1_56","type":"book-chapter","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T15:04:08Z","timestamp":1575644648000},"page":"512-520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Machine Learning Based Trust Model for Misbehaviour Detection in Internet-of-Vehicles"],"prefix":"10.1007","author":[{"given":"Sarah Ali","family":"Siddiqui","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Wei Emma","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"key":"56_CR1","first-page":"193","volume":"46","author":"H Hasrouny","year":"2019","unstructured":"Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: Misbehavior detection & efficient revocation within VANET. J. Inf. Secur. Appl. 46, 193\u2013209 (2019). In: Anthony T.S.H. (eds)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"56_CR2","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","volume":"21","author":"RW van der Heijden","year":"2019","unstructured":"van der Heijden, R.W., Dietzel, S., Leinmuller, T., Kargl, F.: Survey on misbehavior detection in cooperative intelligent transportation system. IEEE Commun. Surv. Tutor. 21(1), 779\u2013811 (2019). In: Lin Y.D. (eds)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"56_CR3","doi-asserted-by":"publisher","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","volume":"64","author":"N Haddadou","year":"2015","unstructured":"Haddadou, N., Rachedi, A., Ghamri, D.Y.: A job market signaling scheme for incentive & trust management in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 64(8), 3657\u20133674 (2015). In: Kato N. (eds)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"56_CR4","doi-asserted-by":"publisher","first-page":"15980","DOI":"10.1109\/ACCESS.2019.2893262","volume":"7","author":"S Guleng","year":"2019","unstructured":"Guleng, S., Wu, C., Chen, X., Wang, X., Yoshinaga, T., Ji, Y.: Decentralized trust evaluation in vehicular IoT. IEEE Access 7, 15980\u201315988 (2019). In: Abbott D. (eds)","journal-title":"IEEE Access"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Lu, Z., Wang, Q., Qu, G., Liu, Z.: BARS: a blockchain-based anonymous reputation system for trust management in VANETs. In: Kung, S.Y., Zomaya, A., Qiu, M. (eds.) Proceedings of the 17th IEEE International Conference on Trust, Security & Privacy in Computing & Communications\/12th IEEE International Conference on Big Data Science & Engineering, NY, pp. 98\u2013103 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"issue":"1","key":"56_CR6","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TSIPN.2018.2801622","volume":"4","author":"T Zhang","year":"2018","unstructured":"Zhang, T., Zhu, Q.: Distributed privacy-preserving collaborative intrusion detection systems for VANETs. IEEE Trans. Signal Inf. Process. Netw. 4(1), 148\u2013161 (2018). In: Ortega A. (eds.)","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"key":"56_CR7","doi-asserted-by":"publisher","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Ridhawi, I.A., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019). In: Kanhere S. (eds)","journal-title":"Ad Hoc Netw."},{"key":"56_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.cose.2018.06.008","volume":"78","author":"EA Shams","year":"2018","unstructured":"Shams, E.A., Rizaner, A., Ulusoy, A.H.: Trust aware support vector machine intrusion detection & prevention system in vehicular ad hoc networks. Comput. Secur. 78, 245\u2013254 (2018). In: Eugene H.S. (eds)","journal-title":"Comput. Secur."},{"key":"56_CR9","series-title":"Communications in Computer & Information Science","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1007\/978-3-642-22720-2_68","volume-title":"Advances in Computing & Communications","author":"J Grover","year":"2011","unstructured":"Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine learning approach for multiple misbehavior detection in VANET. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011. CCIS, vol. 192, pp. 644\u2013653. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22720-2_68"}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36808-1_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:26:36Z","timestamp":1710249996000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-36808-1_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030368074","9783030368081"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36808-1_56","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ajiips.com.au\/iconip2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}