{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T16:28:25Z","timestamp":1771864105037,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7037603","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T14:54:30Z","timestamp":1424184870000},"page":"5032-5037","source":"Crossref","is-referenced-by-count":31,"title":["Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks"],"prefix":"10.1109","author":[{"given":"Mohamed Nidhal","family":"Mejri","sequence":"first","affiliation":[]},{"given":"Jalel","family":"Ben-Othman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"2013"},{"key":"17","article-title":"Review of different approaches for privacy scheme in VANETs","volume":"5","author":"kaushik","year":"2013","journal-title":"International Journal"},{"key":"18","author":"cornillon","year":"2006","journal-title":"R\ufffdgression Th\ufffdorie et Applications"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198908"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990077"},{"key":"14","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCSA.2004.5","article-title":"A test-bed for misbehavior detection in mobile ad-hoc networks-how much can watchdogs really do","author":"buchegger","year":"2004","journal-title":"Mobile Computing Systems and Applications 2004 WMCSA 2004 Sixth IEEE Workshop On IEEE"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503256"},{"key":"12","year":"2006","journal-title":"1609 4-2006-IEEE Trial-use Standard for Wireless Access in Vehicular Environments (Wave)multi-channel Operation"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.859"},{"key":"20","year":"2010","journal-title":"IEEE Standard for Wireless Access in Vehicular Environments (Wave)networking Services (Revision of IEEE Std 1609 3-2007)"},{"key":"22","article-title":"Urban mobility models for VANETs","author":"mahajan","year":"2006","journal-title":"2nd IEEE International Workshop on Next Generation Wireless Networks"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023892"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.467"},{"key":"25","year":"2013","journal-title":"Simulation of Urban Mobility"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"2","article-title":"A survey of inter-vehicle communication","author":"luo","year":"2004","journal-title":"EPFL Lausanne"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2008.4640898"},{"key":"1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"7","article-title":"IEEE standard for information technology-local and metropolitan area networks-specific requirements-part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications amendment 6","year":"2010","journal-title":"Wireless Access in Vehicular Environments"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.10.004"},{"key":"5","article-title":"Detection and prevention of greedy behavior in ad hoc networks","author":"chen","year":"2007","journal-title":"International Conference on Risks and Security of Internet and Systems (CRiSIS2007)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"9","year":"2011","journal-title":"IEEE Standard for Wireless Access in Vehicular Environments (Wave)-multi-channel Operation (Revision of IEEE Std 1609 4-2006)"},{"key":"8","year":"2007","journal-title":"IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications"}],"event":{"name":"GLOBECOM 2014 - 2014 IEEE Global Communications Conference","location":"Austin, TX, USA","start":{"date-parts":[[2014,12,8]]},"end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008954\/7036769\/07037603.pdf?arnumber=7037603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T21:02:01Z","timestamp":1566334921000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7037603\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7037603","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}