{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:30Z","timestamp":1774630230574,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838252","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T15:03:46Z","timestamp":1406559826000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["Tracking spoofed locations in crowdsourced vehicular applications"],"prefix":"10.1109","author":[{"given":"Lautaro","family":"Dolberg","sequence":"first","affiliation":[]},{"given":"Jerome","family":"Francis","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250352"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2009.5360932"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.48"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"11","author":"burgess","year":"0","journal-title":"Google Maps Gets Real-time Traffic Crowdsources Android Gps Data - Accessed on March 5th 2013"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2008.ECP.63"},{"key":"21","year":"2006","journal-title":"Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030635"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550363"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1860058.1860067"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/128679"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.160"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364373"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2068984.2068988"},{"key":"29","article-title":"Central misbehavior evaluation for vanets based on mobility data plausibility","author":"bi\ufffdmeyer","year":"2012","journal-title":"ACM International Workshop on Vehicular Inter-networking Systems and Applications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1055959.1055970"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2005.1543748"},{"key":"10","article-title":"Efficient multidimensional aggregation for large scale monitoring","author":"dolberg","year":"2012","journal-title":"Proceedings of the 26th International Conference on Large Installation System Administration Strategies Tools and Techniques"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0257-z"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1457838.1457895"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161075"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2033079"},{"key":"5","first-page":"393","article-title":"Security issues and challenges of vehicular ad hoc networks (vanet)","author":"samara","year":"2010","journal-title":"New Trends in Information Science and Service Science (NISS) 2010 4th International Conference on"},{"key":"31","first-page":"55","article-title":"Sumosimulation of urban mobility-an overview","author":"behrisch","year":"2011","journal-title":"SIMUL 2011 The Third International Conference on Advances in System Simulation"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.901869"},{"key":"9","article-title":"Intrusion detection in vanets through verification of vehicle movement data","author":"bi\ufffdmeyer","year":"2010","journal-title":"Vehicular Networking Conference (VNC) IEEE"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250353"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","location":"Krakow, Poland","start":{"date-parts":[[2014,5,5]]},"end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838252.pdf?arnumber=6838252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:51:05Z","timestamp":1490284265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838252","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}