{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:30:58Z","timestamp":1743057058573,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030639402"},{"type":"electronic","value":"9783030639419"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63941-9_28","type":"book-chapter","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:04:13Z","timestamp":1611867853000},"page":"373-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Detection Method of Malicious Node Based on Flood Attack in VANET"],"prefix":"10.1007","author":[{"given":"Yizhen","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4528-3756","authenticated-orcid":false,"given":"Yuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yongjian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"28_CR1","unstructured":"Zhou, H.: Research on traffic information collection and processing methods in the Internet of Vehicles. Jilin University (2013)"},{"key":"28_CR2","unstructured":"Xu, C.: Impact of 5G connected vehicles on the development of autonomous driving technology. Inf. Commun. 46\u201347 (2018)"},{"key":"28_CR3","unstructured":"Lin, T.: Research on multi-path TCP transmission and control in vehicle networking. Dalian University of Technology (2017)"},{"issue":"12","key":"28_CR4","first-page":"1421","volume":"48","author":"Y Nan","year":"2015","unstructured":"Nan, Y., Rongbao, K.: Analysis and protection of vehicle network security threats. Commun. Technol. 48(12), 1421\u20131426 (2015)","journal-title":"Commun. Technol."},{"key":"28_CR5","unstructured":"Chen, L.: Security threats and research status of Internet of Vehicles. http:\/\/wemedia.ifeng.com\/73941858\/wemedia.shtml. Accessed 16 Aug 2018"},{"key":"28_CR6","unstructured":"Huang, Y., Wan, L., Li, X.: SYN flooding attack based on IP spoofing. Comput. Technol. Dev. 18(12), 159\u2013161,165 (2008)"},{"key":"28_CR7","unstructured":"Zou, C., Liu, P., Tang, X.: Real-time defense of DHCP flood attack in SDN network. Comput. Appl. http:\/\/knsCnki.net\/kcms\/detail\/51.1307.TP.20181203.1628.008.html. Accessed 16 Aug 2018"},{"key":"28_CR8","unstructured":"Liu, P., Sheng, Z.: Defending against TCP SYN flooding with a new kind of SYN-agent. In: 2008 International Conference on Machine Learning and Cybernetics, Kunming, pp. 1218\u20131221 (2008)"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Degirmencioglu, A., Erdogan, H.T., Mizani, M.A., Y\u0131lmaz, O.: A classification approach for adaptive mitigation of SYN flood attacks: preventing performance loss due to SYN flood attacks. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, Istanbul, pp. 1109-1112. IEEE (2016)","DOI":"10.1109\/NOMS.2016.7502971"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Verma, K., Hasbullah, H., Kumar, A.: An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET. In: 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, pp. 550\u2013555. IEEE (2013)","DOI":"10.1109\/IAdCC.2013.6514286"},{"key":"28_CR11","unstructured":"Chen, W., Li, Y., Liu, W.: Analysis of the progress and key technologies of the connected car industry ZTE. http:\/\/kns.cnki.net\/kcms\/detail\/34.1228.TN.20200217.1748.004.html. Accessed 21 Feb 2020"},{"issue":"06","key":"28_CR12","first-page":"1","volume":"2","author":"W Liangmin","year":"2016","unstructured":"Liangmin, W., Xiaolong, L., Chunxiao, L., Jing, Y., Weidong, Y.: Prospects of 5G telematics. J. Netw. Inf. Secur. 2(06), 1\u201312 (2016)","journal-title":"J. Netw. Inf. Secur."},{"key":"28_CR13","unstructured":"Tang, H., Zeng, Y.: Detection of SYN flood attack based on semi-join list. Comput. Eng. 37(19), 135\u2013137,144 (2011)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Houmer, M., Hasnaoui, M.L., Elfergougui, A.: Security analysis of vehicular ad-hoc networks based on attack tree. In: 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), Tangier, pp. 21\u201326. IEEE (2018)","DOI":"10.1109\/MoWNet.2018.8428905"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","6GN for Future Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63941-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:19:58Z","timestamp":1611868798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63941-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030639402","9783030639419"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63941-9_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"6GN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on 5G for Future Wireless Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gwn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/5gwn.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}