{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:35:54Z","timestamp":1758893754850},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_43","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T06:00:13Z","timestamp":1380952813000},"page":"379-387","source":"Crossref","is-referenced-by-count":11,"title":["Performance Investigation of DMV (Detecting Malicious Vehicle) and D&amp;PMV (Detection and Prevention of Misbehave\/Malicious Vehicles): Future Road Map"],"prefix":"10.1007","author":[{"given":"Megha","family":"Kadam","sequence":"first","affiliation":[]},{"given":"Suresh","family":"Limkar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","series-title":"AISC","first-page":"287","volume-title":"Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013","author":"M. Kadam","year":"2014","unstructured":"Kadam, M., Limkar, S.: D and PMV: New approach for detection and prevention of misbehave\/Malicious vehicles from VANET. In: Satapathy, S.C., Udgata, S.K., Biswal, B.N. (eds.) Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. AISC, vol.\u00a0247, pp. 287\u2013295. Springer, Heidelberg (2014)"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Abdulhamid, H., Tepe, K.E., Abdel-Raheem, E.: Performance of DSRC systems using conventional channel estimation at high velocities. Int. J. Electron. Commun, 556\u2013561 (2007)","DOI":"10.1016\/j.aeue.2006.10.005"},{"issue":"3","key":"43_CR3","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TITS.2007.895290","volume":"8","author":"M. Artimy","year":"2007","unstructured":"Artimy, M.: Local density estimation and dynamic transmission-range assignment in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst.\u00a08(3), 400\u2013412 (2007)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Daeinabi, A., Rahbar, A.G.: Detection of malicious vehicles (DMV) throughmonitoring in Vehicular Ad-Hoc Networks. Springer (April 5, 2011)","DOI":"10.1007\/s11042-011-0789-y"},{"issue":"7","key":"43_CR5","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.adhoc.2010.02.008","volume":"8","author":"M. Ghosh","year":"2010","unstructured":"Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Networks\u00a08(7), 778\u2013790 (2010)","journal-title":"Ad Hoc Networks"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.P.: Secure vehicular communicationsystems: Design and architecture. IEEE Wireless Communication Magazine, 100\u2013109 (2008)","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defenseagainst sybil attack in vehicular ad hoc network based on roadside unitsupport. In: MILCOM, pp. 1\u20137 (2009)","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"43_CR8","unstructured":"Parno, B., Perrig, A.: Challenges in security vehicular networks. In: HotNets-IV (2005)"},{"key":"43_CR9","unstructured":"Klaus, P., Nowey, T., Mletzko, C.: Towards a security architecturevfor vehicular ad hoc networks. In: First International Conference on Availability, Reliability and Security (2006)"},{"issue":"2-3","key":"43_CR10","first-page":"177","volume":"10","author":"S. Biswas","year":"2010","unstructured":"Biswas, S., Haque, M.M., Misic, J.V.: Privacy andanonymity in vanets: A contemporary study. Ad Hoc & Sensor Wireless Networks\u00a010(2-3), 177\u2013192 (2010)","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"43_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 41\u201355. Springer, Heidelberg (2004)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T15:22:17Z","timestamp":1558106537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}