{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:53:54Z","timestamp":1730278434938,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["DUE-1742523"],"award-info":[{"award-number":["DUE-1742523"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,24]]},"DOI":"10.1109\/itsc57777.2023.10421825","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:32:39Z","timestamp":1707867159000},"page":"4550-4555","source":"Crossref","is-referenced-by-count":0,"title":["Agent-Based Modeling for Analysis of Cyber Attacks on the Intelligent Transportation System"],"prefix":"10.1109","author":[{"given":"Elanor","family":"Jackson","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology,Department of Electrical and Computer Engineering,Rolla,MO,USA,65401"}]},{"given":"Sahra Sedigh","family":"Sarvestani","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology,Department of Electrical and Computer Engineering,Rolla,MO,USA,65401"}]},{"given":"Justin","family":"King","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology,Department of Electrical and Computer Engineering,Rolla,MO,USA,65401"}]},{"given":"Ali R.","family":"Hurson","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology,Department of Electrical and Computer Engineering,Rolla,MO,USA,65401"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.061411.00019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7763\/IJMO.2012.V2.126"},{"issue":"6","key":"ref3","doi-asserted-by":"crossref","first-page":"14116","DOI":"10.3390\/s150614116","article-title":"Analysis of intelligent transportation systems using model-driven simulations","volume":"15","author":"Fern\u00e1ndez-Isabel","year":"2015","journal-title":"Sensors"},{"issue":"4","key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/computers9040083","article-title":"Cybersecurity in intelligent transportation systems","volume":"9","author":"Mecheva","year":"2020","journal-title":"Computers"},{"key":"ref5","first-page":"56","volume-title":"Intelligent Transportation Systems - Models, Challenges, Security Aspects","author":"Kolodziej","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2018.8632240"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/risks10050091"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00055"},{"key":"ref10","first-page":"3","volume-title":"Agent-Based Modeling of Entity Behavior in Cybersecurity","author":"Francia","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272234"},{"key":"ref12","article-title":"Agent-based simulation for assessing network security risk due to unauthorized hardware","volume-title":"Spring Simulation Multiconference","author":"Wagner","year":"2015"},{"issue":"10","key":"ref13","doi-asserted-by":"crossref","DOI":"10.3390\/info10100323","article-title":"Information security risk propagation model based on the seir infectious disease model for smart grid","volume":"10","author":"Zhu","year":"2019","journal-title":"Information"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74377-4_90"},{"volume-title":"Simulation modeling software tools & solutions for usiness","year":"2023","key":"ref16"},{"volume-title":"Anylogic in three days: a quick course in simulation modeling","year":"2022","author":"Grigoryev","key":"ref17"},{"volume-title":"V2X Communications Message Set Dictionary J2735_202211","year":"2022","key":"ref18"},{"volume-title":"Vulnerable road user safety message minimum performance requirements j2945\/9_201703","year":"2017","key":"ref19"}],"event":{"name":"2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC)","start":{"date-parts":[[2023,9,24]]},"location":"Bilbao, Spain","end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10420842\/10420843\/10421825.pdf?arnumber=10421825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T11:19:46Z","timestamp":1709464786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10421825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itsc57777.2023.10421825","relation":{},"subject":[],"published":{"date-parts":[[2023,9,24]]}}}