{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:28:41Z","timestamp":1761676121025},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319038889"},{"type":"electronic","value":"9783319038896"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03889-6_21","type":"book-chapter","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T01:27:22Z","timestamp":1386552442000},"page":"185-192","source":"Crossref","is-referenced-by-count":5,"title":["Trusted Information and Security in Smart Mobility Scenarios: The Case of S2-Move Project"],"prefix":"10.1007","author":[{"given":"Pietro","family":"Marchetta","sequence":"first","affiliation":[]},{"given":"Eduard","family":"Natale","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Salvi","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Tirri","sequence":"additional","affiliation":[]},{"given":"Manuela","family":"Tufo","sequence":"additional","affiliation":[]},{"given":"Davide","family":"De Pasquale","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"United Nations Department of Economic and Social Affairs Population Division, World Urbanization Prospects: The 2011 Revision (2012)","key":"21_CR1"},{"doi-asserted-by":"crossref","unstructured":"Marchetta, P., et al.: S2-MOVE: Smart and Social Move. In: IEEE GIIS (2012)","key":"21_CR2","DOI":"10.1109\/GIIS.2012.6466774"},{"unstructured":"Marchetta, P., et al.: Social and Smart Mobility for Future Cities: the S2-Move project. In: AICA 2013 (2013)","key":"21_CR3"},{"unstructured":"Abdullahi, A., Brown, I., El-Moussa, F.: Privacy in the age of Mobility and Smart Devices in Smart Homes. In: PASSAT, SocialCom 2012 (2012)","key":"21_CR4"},{"doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescap\u00e9, A., Ventre, G.: Worm traffic analysis and characterization. In: IEEE Inter. Conference on Communications, ICC (2007)","key":"21_CR5","DOI":"10.1109\/ICC.2007.241"},{"doi-asserted-by":"crossref","unstructured":"Colleen, S., Moore, D.: The spread of the witty worm. IEEE Security & Privacy\u00a02(4) (2004)","key":"21_CR6","DOI":"10.1109\/MSP.2004.59"},{"doi-asserted-by":"crossref","unstructured":"Dainotti, A., King, A., Claffy, K., Papale, F., Pescap\u00e9, A.: Analysis of a \/0 stealth scan from a Botnet. In: ACM IMC (2012)","key":"21_CR7","DOI":"10.1145\/2398776.2398778"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-0-387-44599-1_8","volume-title":"Malware Detection","author":"P. Barford","year":"2007","unstructured":"Barford, P., Vinod, Y.: An inside look at botnets. In: Malware Detection, vol.\u00a027, pp. 171\u2013191. Springer, US (2007)"},{"doi-asserted-by":"crossref","unstructured":"Landman, M.: Managing smart phone security risks. In: Information Security Curriculum Development Conference. ACM (2010)","key":"21_CR9","DOI":"10.1145\/1940941.1940971"},{"doi-asserted-by":"crossref","unstructured":"Chourabi, H., et al.: Understanding smart cities: An integrative framework. In: HICSS (2012)","key":"21_CR10","DOI":"10.1109\/HICSS.2012.615"},{"unstructured":"Wayne, J., Grance, T.: Guidelines on security and privacy in public cloud computing. NIST special publication (2011)","key":"21_CR11"},{"doi-asserted-by":"crossref","unstructured":"Armac, I., et al.: Privacy-friendly smart environments. In: NGMAST (2009)","key":"21_CR12","DOI":"10.1109\/NGMAST.2009.23"},{"doi-asserted-by":"crossref","unstructured":"Barbagli, B., et al.: A real-time traffic monitoring based on wireless sensor network technologies. In: IWCMC (2011)","key":"21_CR13","DOI":"10.1109\/IWCMC.2011.5982652"},{"doi-asserted-by":"crossref","unstructured":"Hadachi, A.: Travel time estimation using sparsely sampled probe GPS data in urban road network, Ph.D. Thesis, Normandie University (2013)","key":"21_CR14","DOI":"10.1049\/el.2013.1032"},{"doi-asserted-by":"crossref","unstructured":"Hedrick, J.K., Tomizuka, M., Varaiya, P.: Control issues in automated highway systems. IEEE Control Systems\u00a014(6) (1994)","key":"21_CR15","DOI":"10.1109\/37.334412"},{"unstructured":"Bernaschi, M., Cacace, F., Pescap\u00e9, A., Za, S.: Analysis and Experimentation over Heterogeneous Wireless Networks. In: TRIDENTCOM 2005, Trento, Italy (2005)","key":"21_CR16"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-24643-5_14","volume-title":"Wired\/Wireless Internet Communications","author":"G. Iannello","year":"2004","unstructured":"Iannello, G., Pescap\u00e8, A., Ventre, G., Vollero, L.: Experimental Analysis of Heterogeneous Wireless Networks. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol.\u00a02957, pp. 153\u2013164. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Karrer, R., Matyasovszki, I., Botta, A., Pescap\u00e9, A.: Experimental evaluation and characterization of the magnets wireless backbone. In: WINTECH, pp. 26\u201333 (2006)","key":"21_CR18","DOI":"10.1145\/1160987.1160994"},{"doi-asserted-by":"crossref","unstructured":"Botta, A., Pescap\u00e9, A., Ventre, G.: Quality of Service Statistics over Heterogeneous Networks: Analysis and Applications. EJOR\u00a0191(3) (2008)","key":"21_CR19","DOI":"10.1016\/j.ejor.2007.07.022"},{"doi-asserted-by":"crossref","unstructured":"di Bernardo, M., et al.: Model reference adaptive control of discrete-time piecewise linear systems. International Journal of Robust and Nonlinear Control\u00a023(7) (2013)","key":"21_CR20","DOI":"10.1002\/rnc.2786"},{"doi-asserted-by":"crossref","unstructured":"di Bernardo, M., Montanaro, U., Santini, S.: Canonical forms of generic piecewise linear continuous systems. IEEE TAC\u00a056(8) (2011)","key":"21_CR21","DOI":"10.1109\/TAC.2011.2129970"},{"doi-asserted-by":"crossref","unstructured":"di Bernardo, M., et al.: Experimental implementation and validation of a novel minimal control synthesis adaptive controller for continuous bimodal piecewise affine systems. Control Engineering Practice\u00a020(3) (2012)","key":"21_CR22","DOI":"10.1016\/j.conengprac.2011.11.003"},{"doi-asserted-by":"crossref","unstructured":"Di Bernardo, M., Montanaro, U., Santini, S.: Novel switched model reference adaptive control for continuous piecewise affine systems. In: CDC 2013 (2008)","key":"21_CR23","DOI":"10.1109\/CDC.2008.4739182"},{"doi-asserted-by":"crossref","unstructured":"Kenney, J.B.: Dedicated Short-Range Communications (DSRC) Standards in the United States (2011)","key":"21_CR24","DOI":"10.1109\/JPROC.2011.2132790"},{"doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks (2007)","key":"21_CR25","DOI":"10.1109\/JSAC.2007.071006"},{"unstructured":"de Fuentes, J.M., Gonzalez-Tablas, A.I., Ribagorda, A.: Overview of Security issues in Vehicular Ad-hoc Networks (2010)","key":"21_CR26"},{"unstructured":"Malina, L., Hajny, J.: Group Signatures for Secure and Privacy Preserving Vehicular Ad Hoc Networks","key":"21_CR27"},{"doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks (2007)","key":"21_CR28","DOI":"10.1109\/INFOCOM.2007.180"},{"doi-asserted-by":"crossref","unstructured":"Zhang, J.: A Survey on Trust Management for VANETs (2011)","key":"21_CR29","DOI":"10.1109\/AINA.2011.86"},{"unstructured":"Dotzer, F., et al.: VARS: A Vehicle Ad-Hoc Network Reputation System (2005)","key":"21_CR30"},{"doi-asserted-by":"crossref","unstructured":"Raya, M., Aziz, A., Hubaux, J.: Efficient Secure Aggregation in VANETs (2006)","key":"21_CR31","DOI":"10.1145\/1161064.1161076"},{"doi-asserted-by":"crossref","unstructured":"Tajeddine, A., Kayssi, A., Chehab, A.: A Privacy-Preserving Trust Model for VANETs (2010)","key":"21_CR32","DOI":"10.1109\/CIT.2010.157"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03889-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T04:30:57Z","timestamp":1558758657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03889-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319038889","9783319038896"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03889-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}