{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:30:45Z","timestamp":1729625445622,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/icves.2017.7991908","type":"proceedings-article","created":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T20:39:14Z","timestamp":1501187954000},"page":"97-102","source":"Crossref","is-referenced-by-count":15,"title":["Security measurement on a cloud-based cyber-physical system used for Intelligent Transportation"],"prefix":"10.1109","author":[{"given":"Kyle","family":"Evers","sequence":"first","affiliation":[]},{"given":"Raymond","family":"Oram","sequence":"additional","affiliation":[]},{"given":"Samy","family":"El-Tawab","sequence":"additional","affiliation":[]},{"given":"M. Hossain","family":"Heydari","sequence":"additional","affiliation":[]},{"given":"B. Brian","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6814019"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1515\/jamsi-2015-0010","article-title":"Performance evaluations of iptables firewall solutions under ddos attacks","volume":"11","author":"simon","year":"2015","journal-title":"Journal of Applied Mathematics Statistics and Informatics"},{"journal-title":"The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy","year":"2013","author":"engebretson","key":"ref31"},{"key":"ref30","article-title":"Password attacks and generation strategies","author":"tasevski","year":"2011","journal-title":"Tartu University Faculty of Mathematics and Computer Sciences"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.02.092108"},{"journal-title":"Ethernet address resolution protocol or converting network protocol addresses to 48 bit Ethernet address for transmission on Ethernet hardware","year":"1982","author":"plummer","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.10.001"},{"journal-title":"An intrusion detection system against udp flood attack and ping of death attack (ddos) in manet","year":"0","author":"acharya","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.616"},{"key":"ref11","first-page":"1","article-title":"Reasoning about job completion time in vehicular clouds","author":"florin","year":"2016","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.1265539"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2016.7489313"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906395"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3141\/2595-02"},{"journal-title":"Forecast number of smartphone users in the U S 2010&#x2013;2018","year":"0","key":"ref17"},{"journal-title":"Tech Rep","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2015.123"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2814340"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2016.7489330"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s16030281"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"journal-title":"Traffic Flow Fundamentals","year":"1990","author":"may","key":"ref6"},{"journal-title":"The Secure Shell (SSH) Protocol Architecture","year":"2006","author":"ylonen","key":"ref29"},{"journal-title":"Intelligent Transportation Systems","year":"2015","key":"ref5"},{"journal-title":"2015 motor vehicle crashes Overview","year":"2016","key":"ref8"},{"key":"ref7","first-page":"447","article-title":"Communication protocols in FRIEND: A cyber-physical system for traffic Flow Related Information Aggregation and Dissemination","author":"ei-tawab","year":"2013","journal-title":"IEEE International Conference on Pervasive Computing and Communications Workshops"},{"key":"ref2","article-title":"Securing the Internet of Things","author":"o'flaherty","year":"2015","journal-title":"SC Magazine UK"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917613"},{"key":"ref1","first-page":"1","article-title":"Poster: Monitoring Transit Systems using Low cost WIFI Technology","author":"ei-tawab","year":"2016","journal-title":"2016 IEEE Vehicular Networking Conference (VNC)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2017.2666578"},{"key":"ref22","article-title":"Security and privacy threats to ITS","volume":"5","author":"karger","year":"1995","journal-title":"Steps Forward Intelligent Transport Systems World Congress"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MITS.2011.940473","article-title":"Smartparking: A secure and intelligent parking system","volume":"3","author":"yan","year":"2011","journal-title":"IEEE Intelligent Transportation Systems Magazine"},{"journal-title":"Instant Traffic Analysis with Tshark How-to","year":"2013","author":"merino","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.26"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061974"}],"event":{"name":"2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","start":{"date-parts":[[2017,6,27]]},"location":"Vienna, Austria","end":{"date-parts":[[2017,6,28]]}},"container-title":["2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7983015\/7991891\/07991908.pdf?arnumber=7991908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T18:26:33Z","timestamp":1569954393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7991908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icves.2017.7991908","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}