{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T10:40:10Z","timestamp":1737110410221,"version":"3.33.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,18]]},"DOI":"10.1109\/ic3i61595.2024.10828590","type":"proceedings-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:34:30Z","timestamp":1736969670000},"page":"893-898","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Algorithm for Black Hole Attacks Detection in VANET"],"prefix":"10.1109","author":[{"given":"Wajid","family":"Ali","sequence":"first","affiliation":[{"name":"CCSIT, Teerthanker Mahaveer University,Moradabad,Uttar Pradesh,India"}]},{"given":"Shalini Z.","family":"Ninoria","sequence":"additional","affiliation":[{"name":"CCSIT, Teerthanker Mahaveer University,Moradabad,Uttar Pradesh,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103352"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.11.06"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0789-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00013-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9457536"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app122312448"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/2413-3224"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3501295"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v10i5.3127"},{"issue":"7","key":"ref10","first-page":"22","article-title":"A taxonomy of security attacks and issues in vehicular ad-hoc networks (VANETs)","volume-title":"Int J Comput Appl","volume":"20","author":"Deepak"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2002.1020231"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s22051897"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501464"},{"article-title":"A Delay Sensitive Multi-Path Selection to Prevent the Rushing Attack in VANET","volume-title":"Proceedings of the 2021 5th International Conference on Information Systems and Computer Networks (ISCON)","author":"Reddy","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/s1570-8705(03)00019-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02931-3_43"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1639-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.561011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5824-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030061"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2423915"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103352"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034327"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icicict1.2017.8342799"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995820"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ic3se62002.2024.10593183"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2478\/ias-2024-0001"}],"event":{"name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2024,9,18]]},"location":"Greater Noida, India","end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 7th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10828566\/10827843\/10828590.pdf?arnumber=10828590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T06:03:18Z","timestamp":1737007398000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10828590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ic3i61595.2024.10828590","relation":{},"subject":[],"published":{"date-parts":[[2024,9,18]]}}}