{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:54:13Z","timestamp":1725839653045},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319272924"},{"type":"electronic","value":"9783319272931"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27293-1_24","type":"book-chapter","created":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T07:24:37Z","timestamp":1448695477000},"page":"273-284","source":"Crossref","is-referenced-by-count":5,"title":["Similarity-Based Trust Management System for Detecting Fake Safety Messages in VANETs"],"prefix":"10.1007","author":[{"given":"Hind","family":"Al Falasi","sequence":"first","affiliation":[]},{"given":"Nader","family":"Mohamed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Hadim, S., Al-Jaroodi, J., Mohamed, N.: Middleware issues and approaches for mobile ad hoc networks. In: The IEEE Consumer Communications and Networking conference (CCNC 2006) (2006)","key":"24_CR1","DOI":"10.4304\/jcm.1.4.11-21"},{"doi-asserted-by":"crossref","unstructured":"Jawhar, I., Mohamed, N., Zhang, L.: Inter-vehicular communication systems, protocols and middleware. In: 2010 IEEE Fifth International Conference on Networking, Architecture and Storage (NAS), IEEE (2010)","key":"24_CR2","DOI":"10.1109\/NAS.2010.49"},{"doi-asserted-by":"crossref","unstructured":"Al Falasi, H., Masud, M.M., Mohamed, N.: Trusting the same: using similarity to establish trust among vehicles. In: The 2015 International Conference on Collaboration Technologies and Systems 2015: Atlanta","key":"24_CR3","DOI":"10.1109\/CTS.2015.7210401"},{"issue":"3","key":"24_CR4","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","volume":"35","author":"FG M\u00e1rmol","year":"2012","unstructured":"M\u00e1rmol, F.G., P\u00e9rez, G.M.: TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 35(3), 934\u2013941 (2012)","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Ding, Q., et al.: Reputation-based trust model in vehicular ad hoc networks. In: 2010 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE (2010)","key":"24_CR5","DOI":"10.1109\/WCSP.2010.5633513"},{"unstructured":"D\u00f6tzer, F., Fischer, L., Magiera, P.: Vars: A vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks. IEEE (2005)","key":"24_CR6"},{"issue":"2","key":"24_CR7","first-page":"37","volume":"73","author":"FA Ghaleb","year":"2015","unstructured":"Ghaleb, F.A., Zainal, A., Rassam, M.A.: Data verification and misbehavior detection in vehicular ad-hoc networks. J. Teknologi 73(2), 37\u201344 (2015)","journal-title":"J. Teknologi"},{"doi-asserted-by":"crossref","unstructured":"Zaidi, K., et al.: Data-centric rogue node detection in VANETs. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE (2014)","key":"24_CR8","DOI":"10.1109\/TrustCom.2014.51"},{"unstructured":"Cao, Z., et al.: Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks. In: INFOCOM Workshops 2008. IEEE (2008)","key":"24_CR9"},{"doi-asserted-by":"crossref","unstructured":"Petit, J., Mammeri, Z.: Dynamic consensus for secured vehicular ad hoc networks. In: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE (2011)","key":"24_CR10","DOI":"10.1109\/WiMOB.2011.6085418"},{"unstructured":"Raya, M.: Data-centric trust in ephemeral networks. In: \u00c9cole Polytechnique F\u00e9d\u00e9rale De Lausanne 2009","key":"24_CR11"},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu, X., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1\u201337 (2008)","journal-title":"Knowl. Inf. Syst."},{"unstructured":"Krajzewicz, D., Bonert, M., Wagner, P.: The open source traffic simulation package SUMO. In: RoboCup 2006 Infrastructure Simulation Competition, vol. 1, pp. 1\u20135 (2006)","key":"24_CR13"}],"container-title":["Lecture Notes in Computer Science","Internet of Vehicles - Safe and Intelligent Mobility"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27293-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T18:35:08Z","timestamp":1559327708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27293-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319272924","9783319272931"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27293-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}