{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:14:28Z","timestamp":1743041668818,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_20","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"278-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection Scheme for Autonomous Driving Vehicles"],"prefix":"10.1007","author":[{"given":"Weidong","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Zhou","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"20_CR1","first-page":"11","volume":"2","author":"J Bierstedt","year":"2014","unstructured":"Bierstedt, J., Gooze, A., Gray, C., Raykin, L., Walters, J.: Effects of next-generation vehicles on travel demand and highway capacity. FP Think Working Group 2, 11 (2014)","journal-title":"FP Think Working Group"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/TITS.2017.2688860","volume":"19","author":"J Guo","year":"2018","unstructured":"Guo, J., Zhang, Y., Chen, X., Yousefi, S., Guo, C., Wang, Y.: Spatial stochastic vehicle traffic modeling for VANETs. IEEE Trans. Intell. Transp. Syst. 19(2), 416\u2013425 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"20_CR3","doi-asserted-by":"publisher","first-page":"5232","DOI":"10.1109\/TVT.2020.2981127","volume":"69","author":"S Tangade","year":"2020","unstructured":"Tangade, S., Manvi, S.S., Lorenz, P.: Trust management scheme based on hybrid cryptography for secure communications in VANETs. IEEE Trans. Veh. Technol. 69(5), 5232\u20135243 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Singh, P.K., Singh, R., Nandi, S.K., Ghafoor, K.Z., Rawat, D.B., Nandi, S.: Blockchain-based adaptive trust management in internet of vehicles using smart contract. IEEE Trans. Intell. Transp. Syst. (2020)","DOI":"10.1109\/TITS.2020.3004041"},{"issue":"2","key":"20_CR5","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1080\/09720529.2019.1585635","volume":"22","author":"M Kumar","year":"2019","unstructured":"Kumar, M., Jain, V., Jain, A., Bisht, U.S., Gupta, N.: Evaluation of black hole attack with avoidance scheme using aodv protocol in vanet. J. Discrete Math. Sci. Cryptogr. 22(2), 277\u2013291 (2019)","journal-title":"J. Discrete Math. Sci. Cryptogr."},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Anand, S. J. V., Pranav, I., Neetish, M., Narayanan, J.: Network intrusion detection using improved genetic k-means algorithm. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2441\u20132446, Bangalore (2018). https:\/\/doi.org\/10.1109\/ICACCI.2018.8554710","DOI":"10.1109\/ICACCI.2018.8554710"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Sedjelmaci, H., Senouci, S. M.: A new intrusion detection framework for vehicular networks. In: IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 538\u2013543 (2014). https:\/\/doi.org\/10.1109\/ICC.2014.6883374","DOI":"10.1109\/ICC.2014.6883374"},{"issue":"10","key":"20_CR8","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1002\/sec.687","volume":"6","author":"H Sedjelmaci","year":"2013","unstructured":"Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Netw. 6(10), 1211\u20131224 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"20_CR9","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1024600519144","volume":"9","author":"Y Zhang","year":"2003","unstructured":"Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wireless Netw. 9(5), 545\u2013556 (2003)","journal-title":"Wireless Netw."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: International Conference on Innovation (2014)","DOI":"10.1016\/j.sbspro.2014.03.700"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Bismeyer, N., Stresing, C., Bayarou, K. M.: Intrusion detection in VANETs through verification of vehicle movement data (2010)","DOI":"10.1109\/VNC.2010.5698232"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Sedjelmaci, H., Bouali, T., Senouci, S.M.: Detection and prevention from misbehaving intruders in vehicular networks. In: IEEE Global Communications Conference, vol. 2, pp. 39\u201344 (2015)","DOI":"10.1109\/GLOCOM.2014.7036781"},{"key":"20_CR13","first-page":"405","volume":"87","author":"A Nguyen","year":"2013","unstructured":"Nguyen, A., Mokdad, L., Othman, J.: DJAVAN: detecting jamming attacks in vehicle ad hoc networks. Perform. Eval. 87, 405\u2013410 (2013)","journal-title":"Perform. Eval."},{"key":"20_CR14","doi-asserted-by":"publisher","unstructured":"Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Jose, CA, pp. 1\u20138 (2006). https:\/\/doi.org\/10.1109\/MOBIQ.2006.340422","DOI":"10.1109\/MOBIQ.2006.340422"},{"issue":"1","key":"20_CR15","first-page":"1","volume":"5","author":"UF Minhas","year":"2006","unstructured":"Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell.: Theory Pract. (IJCITP) 5(1), 1\u20138 (2006)","journal-title":"Int. J. Comput. Intell.: Theory Pract. (IJCITP)"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"63868","DOI":"10.1109\/ACCESS.2018.2872740","volume":"6","author":"QY Xu","year":"2018","unstructured":"Xu, Q.Y., Su, Z., Wang, Y.T., Dai, M.H.: A trustworthy content caching and bandwidth allocation scheme with edge computing for smart campus. IEEE Access 6, 63868\u201363879 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"20_CR17","first-page":"1","volume":"66","author":"H Hu","year":"2016","unstructured":"Hu, H., Lu, R., Zhang, Z., Shao, J.: Replace: a reliable trust-based platoon service recommendation scheme in vanet. IEEE Trans. Veh. Technol. 66(2), 1\u20131 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1109\/TITS.2012.2188519","volume":"13","author":"MJ Khabbaz","year":"2012","unstructured":"Khabbaz, M.J., Fawaz, W.F., Assi, C.M.: A simple free-flow traffific model for vehicular intermittently connected networks. IEEE Trans. Intell. Transp. Syst. 13(3), 1312\u20131326 (2012)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"20_CR19","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.001.1800535","volume":"33","author":"R Xing","year":"2019","unstructured":"Xing, R., Su, Z., Zhang, N.: Trust-evaluation-based intrusion detection and reinforcement learning in autonomous driving. IEEE Netw. 33(5), 54\u201360 (2019)","journal-title":"IEEE Netw."},{"issue":"2","key":"20_CR20","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1016\/j.jmaa.2006.07.098","volume":"330","author":"H Gingold","year":"2007","unstructured":"Gingold, H., Xue, F.: On asymptotic summation of potentially oscillatory difference systems. J. Math. Anal. Appl. 330(2), 1068\u20131092 (2007)","journal-title":"J. Math. Anal. Appl."},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Le, V., Lin, Y.W., Wang, X.M., Feng, Z.Y., Zhang, P.: A cell based dynamic spectrum management scheme with interference mitigation for cognitive networks. In: VTC Spring 2008 - IEEE Vehicular Technology Conference, pp. 1594\u20131598 (2008)","DOI":"10.1109\/VETECS.2008.370"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:29:04Z","timestamp":1619317744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}