{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:32:45Z","timestamp":1758706365873},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T00:00:00Z","timestamp":1593907200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T00:00:00Z","timestamp":1593907200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11276-020-02413-0","type":"journal-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T13:02:35Z","timestamp":1593954155000},"page":"5897-5917","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs"],"prefix":"10.1007","volume":"26","author":[{"given":"S.","family":"Prabakeran","sequence":"first","affiliation":[]},{"given":"T.","family":"Sethukarasi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,5]]},"reference":[{"key":"2413_CR1","doi-asserted-by":"crossref","first-page":"107099","DOI":"10.1016\/j.comnet.2020.107099","volume":"169","author":"BJ Wafa","year":"2020","unstructured":"Wafa, B. J., Mauro, C., & Chhagan, L. (2020). Security and design requirements for software-defined VANETs. Computer Networks, 169, 107099.","journal-title":"Computer Networks"},{"issue":"3","key":"2413_CR2","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1002\/sec.750","volume":"7","author":"N Deb","year":"2014","unstructured":"Deb, N., Chakraborty, M., & Chaki, N. (2014). CORIDS: A cluster-oriented reward-based intrusion detection system for wireless mesh networks. Security and Communication Networks, 7(3), 532\u2013543.","journal-title":"Security and Communication Networks"},{"issue":"6","key":"2413_CR3","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1016\/j.compeleceng.2014.01.009","volume":"40","author":"N Kumar","year":"2014","unstructured":"Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40(6), 1981\u20131996.","journal-title":"Computers & Electrical Engineering"},{"issue":"6","key":"2413_CR4","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1002\/sec.200","volume":"4","author":"S Misra","year":"2011","unstructured":"Misra, S., Venkata Krishna, P., & Abraham, K. I. (2011). A stochastic learning automata based solution for intrusion detection in vehicular ad hoc networks. Security and Communication Networks, 4(6), 666\u2013677.","journal-title":"Security and Communication Networks"},{"issue":"8","key":"2413_CR5","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1109\/TITS.2016.2517603","volume":"17","author":"S Jiang","year":"2016","unstructured":"Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems, 17(8), 2193\u20132204.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"9","key":"2413_CR6","doi-asserted-by":"crossref","first-page":"4095","DOI":"10.1109\/TVT.2012.2209903","volume":"61","author":"Q Li","year":"2012","unstructured":"Li, Q., Malip, A., Martin, K. M., Ng, S.-L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095\u20134108.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2413_CR7","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.vehcom.2016.11.010","volume":"9","author":"CA Kerrache","year":"2017","unstructured":"Kerrache, C. A., Lagraa, N., Calafate, C. T., & Lakas, A. (2017). TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs. Vehicular Communications, 9, 254\u2013267.","journal-title":"Vehicular Communications"},{"issue":"1","key":"2413_CR8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"S Vinu","year":"2019","unstructured":"Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173\u2013197.","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"2413_CR9","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/TMC.2013.2296513","volume":"13","author":"Z Li","year":"2014","unstructured":"Li, Z., & Chigan, C. T. (2014). On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 13(10), 2334\u20132344.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"8","key":"2413_CR10","doi-asserted-by":"crossref","first-page":"3947","DOI":"10.1109\/TVT.2011.2162972","volume":"60","author":"ME Mahmoud","year":"2011","unstructured":"Mahmoud, M. E., & Shen, X. (2011). An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Transactions on Vehicular Technology, 60(8), 3947\u20133962.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"2413_CR11","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1166\/jctn.2018.7474","volume":"15","author":"Prabakeran Saravanan","year":"2018","unstructured":"Prabakeran Saravanan, Sethukarasi, T., & Indumathi, V. (2018). Authentic novel trust propagation model with deceptive recommendation penalty scheme for distributed denial of service attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2383\u20132389.","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"issue":"6","key":"2413_CR12","doi-asserted-by":"crossref","first-page":"2221","DOI":"10.1166\/jctn.2018.7440","volume":"15","author":"Prabakeran Saravanan","year":"2018","unstructured":"Prabakeran Saravanan, Sethukarasi, T., & Indumathi, V. (2018). An efficient software defined network based cooperative scheme for mitigation of distributed denial of service (DDoS) attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2221\u20132226.","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"key":"2413_CR13","first-page":"1748","volume":"14","author":"P Saravanan","year":"2018","unstructured":"Saravanan, P., Sethukarasi, T., & Indumathi, V. (2018). Two level trust propagation model with global weighted index for detecting and mitigating denial of service. TAGA Journal of Graphic Technology, 14, 1748\u20130345.","journal-title":"TAGA Journal of Graphic Technology"},{"issue":"2","key":"2413_CR14","first-page":"8","volume":"7","author":"Prabakeran Saravanan","year":"2019","unstructured":"Saravanan, P., Swarnapriya, K., & Agnes Priscilla Remina. (2019). Multi-defense framework for mitigating man in the cloud attack (MitC).\u00a0i-Manager's Journal on Computer Science,\u00a07(2), 8.","journal-title":"Science"},{"key":"2413_CR15","doi-asserted-by":"crossref","first-page":"117","DOI":"10.22266\/ijies2016.0930.12","volume":"9","author":"Vinu Sundararaj","year":"2016","unstructured":"Vinu Sundararaj. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. International Journal of Intelligent Engineering and Systems, 9(3), 117\u2013126.","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"2413_CR16","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"S Vinu","year":"2018","unstructured":"Vinu, S., Selvi, M., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers and Security, 77, 277\u2013288.","journal-title":"Computers and Security"},{"key":"2413_CR17","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.future.2019.07.006","volume":"101","author":"R Hussain","year":"2019","unstructured":"Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843\u2013864.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"2413_CR18","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/COMST.2014.2345420","volume":"17","author":"J Petit","year":"2014","unstructured":"Petit, J., Schaub, F., Feiri, M., & Kargl, F. (2014). Pseudonym schemes in vehicular networks: A survey. IEEE Communications Surveys & Tutorials, 17(1), 228\u2013255.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2413_CR19","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Tam\u00e1s H., Andr\u00e9 W., & William W. (2009). Slow: A practical pseudonym changing scheme for location privacy in vanets. In 2009 IEEE vehicular networking conference (VNC) (pp. 1\u20138). IEEE.","DOI":"10.1109\/VNC.2009.5416380"},{"issue":"12","key":"2413_CR20","doi-asserted-by":"crossref","first-page":"10718","DOI":"10.1109\/TVT.2017.2736885","volume":"66","author":"K Emara","year":"2017","unstructured":"Emara, K. (2017). Safety-aware location privacy in VANET: Evaluation and comparison. IEEE Transactions on Vehicular Technology, 66(12), 10718\u201310731.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2413_CR21","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Mohammad H. M., Jean-Yves L. B., & Jean-Pierre H. (2010). On the age of pseudonyms in mobile ad hoc networks. In 2010 Proceedings IEEE INFOCOM (pp. 1\u20139). IEEE.","DOI":"10.1109\/INFCOM.2010.5461975"},{"issue":"1","key":"2413_CR22","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2011","unstructured":"Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2011). Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions on Vehicular Technology, 61(1), 86\u201396.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2413_CR23","doi-asserted-by":"crossref","first-page":"100179","DOI":"10.1016\/j.vehcom.2019.100179","volume":"19","author":"M Arif","year":"2019","unstructured":"Arif, M., Guojun Wang, M., Bhuiyan, Z. A., Wang, T., & Chen, J. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.","journal-title":"Vehicular Communications"},{"issue":"6","key":"2413_CR24","doi-asserted-by":"crossref","first-page":"1599","DOI":"10.1016\/j.jnca.2013.02.003","volume":"36","author":"Y Pan","year":"2013","unstructured":"Pan, Y., & Li, J. (2013). Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications, 36(6), 1599\u20131609.","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"2413_CR25","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1007\/s12083-014-0269-z","volume":"8","author":"Y Sun","year":"2015","unstructured":"Sun, Y., Zhang, B., Zhao, B., Xiangyu, S., & Jinshu, S. (2015). Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Networking and Applications, 8(6), 1108\u20131121.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"2413_CR26","doi-asserted-by":"crossref","unstructured":"Ullah, I., Abdul W., Munam A. S., & Abdul W. (2017). VBPC: Velocity based pseudonym changing strategy to protect location privacy of vehicles in VANET. In 2017 International conference on communication technologies (ComTech) (pp. 132\u2013137). IEEE.","DOI":"10.1109\/COMTECH.2017.8065762"},{"issue":"1","key":"2413_CR27","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/s11036-009-0175-4","volume":"15","author":"A Wasef","year":"2010","unstructured":"Wasef, A., & Shen, X. S. (2010). REP: Location privacy for VANETs using random encryption periods. Mobile Networks and Applications, 15(1), 172\u2013185.","journal-title":"Mobile Networks and Applications"},{"issue":"12","key":"2413_CR28","doi-asserted-by":"crossref","first-page":"5631","DOI":"10.1109\/TVT.2015.2487262","volume":"64","author":"B Ying","year":"2015","unstructured":"Ying, B., Makrakis, D., & Hou, Z. (2015). Motivation for protecting selfish vehicles\u2019 location privacy in vehicular networks. IEEE Transactions on Vehicular Technology, 64(12), 5631\u20135641.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"2413_CR29","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733\u20131743.","journal-title":"Wireless Networks"},{"issue":"12","key":"2413_CR30","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Baowen, X., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681\u20132691.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"2413_CR31","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","volume":"12","author":"D Huang","year":"2011","unstructured":"Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736\u2013746.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"3","key":"2413_CR32","doi-asserted-by":"crossref","first-page":"935","DOI":"10.1007\/s11276-016-1197-z","volume":"23","author":"G Kumaresan","year":"2017","unstructured":"Kumaresan, G., & Adiline Macriga, T. (2017). Group key authentication scheme for VANET intrusion detection (GKAVIN). Wireless Networks, 23(3), 935\u2013945.","journal-title":"Wireless Networks"},{"issue":"6","key":"2413_CR33","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., & Lai, Y.-M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441\u20131449.","journal-title":"Wireless Networks"},{"issue":"4","key":"2413_CR34","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2015","unstructured":"Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960\u2013969.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2413_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, H., Xin Y., & Xiaolin L. (2010). cTrust: trust aggregation in cyclic mobile ad hoc networks. In European conference on parallel processing (pp. 454\u2013465). Springer, Berlin.","DOI":"10.1007\/978-3-642-15291-7_43"},{"key":"2413_CR36","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.adhoc.2014.08.018","volume":"24","author":"A Jesudoss","year":"2015","unstructured":"Jesudoss, A., Kasmir Raja, S. V., & Sulaiman, A. (2015). Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Networks, 24, 250\u2013263.","journal-title":"Ad Hoc Networks"},{"key":"2413_CR37","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.comcom.2013.12.005","volume":"41","author":"OA Wahab","year":"2014","unstructured":"Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Computer Communications, 41, 43\u201354.","journal-title":"Computer Communications"},{"issue":"3","key":"2413_CR38","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/TSMCC.2010.2084571","volume":"41","author":"UF Minhas","year":"2010","unstructured":"Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2010). A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(3), 407\u2013420.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"2413_CR39","doi-asserted-by":"crossref","unstructured":"Butun, I. (2017). Privacy and trust relations in internet of things from the user point of view. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1\u20135). IEEE.","DOI":"10.1109\/CCWC.2017.7868419"},{"issue":"2","key":"2413_CR40","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/JCN.2013.000028","volume":"15","author":"Y-M Chen","year":"2013","unstructured":"Chen, Y.-M., & Wei, Y.-C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153\u2013163.","journal-title":"Journal of Communications and Networks"},{"issue":"3","key":"2413_CR41","doi-asserted-by":"crossref","first-page":"6138251","DOI":"10.1155\/2016\/6138251","volume":"12","author":"J Wang","year":"2016","unstructured":"Wang, J., Zhang, Y., Wang, Y., & Xiang, G. (2016). RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"7","key":"2413_CR42","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Rongxing, L., Lin, X., Shen, X., & Jinshu, S. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59(7), 3589\u20133603.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2413_CR43","doi-asserted-by":"crossref","unstructured":"Zhao, H., Xin Y., & Xiaolin L. (2010). cTrust: Trust aggregation in cyclic mobile ad hoc networks. In\u00a0European conference on parallel processing (pp. 454\u2013465). Springer, Berlin.","DOI":"10.1007\/978-3-642-15291-7_43"},{"issue":"15","key":"2413_CR44","doi-asserted-by":"crossref","first-page":"2612","DOI":"10.1002\/sec.1506","volume":"9","author":"AK Malhi","year":"2016","unstructured":"Malhi, A. K., & Batra, S. (2016). Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc networks. Security and Communication Networks, 9(15), 2612\u20132626.","journal-title":"Security and Communication Networks"},{"key":"2413_CR45","doi-asserted-by":"crossref","unstructured":"Eberhart, R., & Kennedy, J. (1995). A new optimizer using particle swarm theory. In Proceedings of the sixth international symposium on Micro machine and human science, 1995. MHS\u201995 (pp. 39\u201343).","DOI":"10.1109\/MHS.1995.494215"},{"key":"2413_CR46","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-642-12538-6_6","volume-title":"Nature inspired cooperative strategies for optimization (NICSO 2010)","author":"X-S Yang","year":"2010","unstructured":"Yang, X.-S. (2010). A new metaheuristic bat-inspired algorithm. Nature inspired cooperative strategies for optimization (NICSO 2010) (pp. 65\u201374). Berlin: Springer."},{"key":"2413_CR47","first-page":"1","volume":"2010","author":"A Ludwig","year":"2010","unstructured":"Ludwig, A., & Schmidt, K. D. (2010). Gauss\u2013Markov loss prediction in a linear model. Casualty Actuarial Society E-Forum, Fall, 2010, 1\u201348.","journal-title":"Casualty Actuarial Society E-Forum, Fall"},{"issue":"4","key":"2413_CR48","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1007\/s00521-015-1920-1","volume":"27","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S. (2016). Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computing and Applications, 27(4), 1053\u20131073.","journal-title":"Neural Computing and Applications"},{"issue":"4","key":"2413_CR49","doi-asserted-by":"crossref","first-page":"1715","DOI":"10.1016\/j.chaos.2007.09.063","volume":"40","author":"B Alatas","year":"2009","unstructured":"Alatas, B., Akin, E., & Bedri Ozer, A. (2009). Chaos embedded particle swarm optimization algorithms. Chaos, Solitons & Fractals, 40(4), 1715\u20131734.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"1","key":"2413_CR50","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.cnsns.2012.06.009","volume":"18","author":"AH Gandomi","year":"2013","unstructured":"Gandomi, A. H., Yang, X.-S., Talatahari, S., & Alavi, A. H. (2013). Firefly algorithm with chaos. Communications in Nonlinear Science and Numerical Simulation, 18(1), 89\u201398.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"2413_CR51","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46\u201361.","journal-title":"Advances in Engineering Software"},{"issue":"3","key":"2413_CR52","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","volume":"35","author":"F G\u00b4omez M\u00b4armol","year":"2012","unstructured":"G\u00b4omez M\u00b4armol, F., & Mart\u00b4\u0131nez P\u00b4erez, G. (2012). Trip, A trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3), 934\u2013941.","journal-title":"Journal of Network and Computer Applications"},{"key":"2413_CR53","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.compeleceng.2015.02.018","volume":"43","author":"H Sedjelmaci","year":"2015","unstructured":"Sedjelmaci, H., & Senouci, S. M. (2015). An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Computers & Electrical Engineering, 43, 33\u201347.","journal-title":"Computers & Electrical Engineering"},{"issue":"4","key":"2413_CR54","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj, V. (2019). Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. International Journal of Biomedical Engineering and Technology, 31(4), 325.","journal-title":"International Journal of Biomedical Engineering and Technology"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02413-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-020-02413-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02413-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T14:29:54Z","timestamp":1601648994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-020-02413-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,5]]},"references-count":54,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["2413"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02413-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,5]]},"assertion":[{"value":"5 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}