{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:07:25Z","timestamp":1758845245851,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icsrs48664.2019.8987644","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T21:46:05Z","timestamp":1581371165000},"page":"41-45","source":"Crossref","is-referenced-by-count":11,"title":["Achieving Zero Collision Probability in Vehicle Platooning under Cyber Attacks via Machine Learning"],"prefix":"10.1109","author":[{"given":"M.","family":"Mongelli","sequence":"first","affiliation":[]},{"given":"M.","family":"Muselli","sequence":"additional","affiliation":[]},{"given":"E.","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987672"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218490"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2018.00018"},{"key":"ref13","first-page":"47","author":"marchesani","year":"2013","journal-title":"Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2179936"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/b107408"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835972"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-15-S5-S4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.206"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.jss.2018.12.006","article-title":"State of the art of cyber-physical systems security: An automatic control perspective","volume":"149","author":"lun","year":"2019","journal-title":"Journal of Systems and Software"},{"journal-title":"What if analysis","year":"0","author":"rizzi","key":"ref9"}],"event":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2019,11,20]]},"location":"Rome, Italy","end":{"date-parts":[[2019,11,22]]}},"container-title":["2019 4th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967508\/8987581\/08987644.pdf?arnumber=8987644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:49:39Z","timestamp":1658141379000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icsrs48664.2019.8987644","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}