{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:09:39Z","timestamp":1758892179660},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_33","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T10:00:13Z","timestamp":1380967213000},"page":"293-303","source":"Crossref","is-referenced-by-count":5,"title":["D&amp;PMV: New Approach for Detection and Prevention of Misbehave\/Malicious Vehicles from VANET"],"prefix":"10.1007","author":[{"given":"Megha","family":"Kadam","sequence":"first","affiliation":[]},{"given":"Suresh","family":"Limkar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Abdulhamid, H., Tepe, K.E., Abdel-Raheem, E.: Performance of DSRC systems using conventional channel estimation at high velocities. Int. J. Electron. Commun., 556\u2013561 (2007)","DOI":"10.1016\/j.aeue.2006.10.005"},{"issue":"3","key":"33_CR2","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TITS.2007.895290","volume":"8","author":"M. Artimy","year":"2007","unstructured":"Artimy, M.: Local density estimation and dynamic transmission-range assignment in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst.\u00a08(3), 400\u2013412 (2007)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Bettstetter, C.: Smooth is better than sharp: A random mobility model for simulation of wireless networks. In: 4th ACM International Work-shop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM 2001), Rome, Italy (2001)","DOI":"10.1145\/381591.381600"},{"key":"33_CR4","unstructured":"Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. AmenehDaeinabi & Akbar GhaffarpourRahbar Springer Science+Business Media, LLC (2011)"},{"issue":"1","key":"33_CR5","first-page":"39","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw.\u00a015(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw."},{"issue":"12","key":"33_CR6","doi-asserted-by":"publisher","first-page":"2827","DOI":"10.1016\/j.comcom.2007.12.003","volume":"31","author":"N.W. Wang","year":"2008","unstructured":"Wang, N.W., Hauang, Y.M., Chen, W.M.: A novel secure communication scheme in vehicular ad hoc networks. Comput. Commun.\u00a031(12), 2827\u20132837 (2008)","journal-title":"Comput. Commun."},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/11561354_5","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"P. Fan","year":"2005","unstructured":"Fan, P., Haran, J.G., Dillenburg, J., Nelson, P.C.: Cluster-Based Framework in Vehicular Ad-Hoc Networks. In: Syrotiuk, V.R., Ch\u00e1vez, E. (eds.) ADHOC-NOW 2005. LNCS, vol.\u00a03738, pp. 32\u201342. Springer, Heidelberg (2005)"},{"issue":"3","key":"33_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Y.-C. Hu","year":"2004","unstructured":"Hu, Y.-C., Perrig, A.: Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy\u00a02(3), 28\u201339 (2004), doi:10.1109\/MSP.2004.1","journal-title":"IEEE Security & Privacy"},{"issue":"12","key":"33_CR9","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1016\/j.comcom.2008.01.009","volume":"31","author":"G. Yan","year":"2008","unstructured":"Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position. Comput. Commun.\u00a031(12), 2883\u20132897 (2008)","journal-title":"Comput. Commun."},{"key":"33_CR10","unstructured":"Raya, M., Hubaux, J.P.: The Security of Vehicular Ad Hoc Networks. In: SASN 2005, Alexandria, Virginia, USA (November 7, 2005), Copyright 2005 ACM 95932275\/05\/0011"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Communications. IEEE Wireless Communications\u00a013 (October 2006)","DOI":"10.1109\/WC-M.2006.250352"},{"key":"33_CR12","unstructured":"Golle, P., Greene, D., Staddon Detecting, J.: Staddon Detecting and Correcting Malicious Data in VANETs. In: VANET 2004, Philadelphia, Pennsylvania, USA (October 1, 2004), Copyright 2004 ACM 1581139225\/04\/0010"},{"key":"33_CR13","unstructured":"Abdalla, G.M.T., Senouci, S.M.: Current Trends in Vehicular Ad Hoc Networks. In: Proceedings of UBIROADS Workshop (2007)"},{"key":"33_CR14","volume-title":"Certificate Revocation in Vehicular Networks , Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences","author":"M. Raya","year":"2006","unstructured":"Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate Revocation in Vehicular Networks, Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences. EPFL, Switzerland (2006)"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Nadeem, T., Shankar, P.: A comparative study of data dissemination models for VANETs. IEEE Mob. Ubiquitous Syst. Netw. Serv., 1\u201310 (2006)","DOI":"10.1109\/MOBIQ.2006.340402"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Picconi, F., Ravi, N., Gruteser, M., Iftode, L.: Probabilistic validation of aggregated data in Vehicular Ad Hoc Networks. In: International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, pp. 76\u201385 (2006)","DOI":"10.1145\/1161064.1161077"},{"key":"33_CR17","unstructured":"Parno, B., Perrig, A.: Challenges in Securing Vehicular Networks"},{"issue":"8","key":"33_CR18","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","volume":"25","author":"M. Raya","year":"2007","unstructured":"Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and FaultyNodes in Vehicular Networks. IEEE J. Sel. Areas Commun.\u00a025(8), 1557\u20131568 (2007)","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T19:51:12Z","timestamp":1558122672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}