{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:50Z","timestamp":1762004750060,"version":"build-2065373602"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ssic.2015.7245328","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:39:50Z","timestamp":1441946390000},"page":"1-5","source":"Crossref","is-referenced-by-count":20,"title":["A reputation system for detection of black hole attack in vehicular networking"],"prefix":"10.1109","author":[{"given":"R.","family":"Khatoun","sequence":"first","affiliation":[]},{"given":"P.","family":"Gut","sequence":"additional","affiliation":[]},{"given":"R.","family":"Doulami","sequence":"additional","affiliation":[]},{"given":"L.","family":"Khoukhi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Serhrouchni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages","year":"2013","journal-title":"IEEE Std 1609 2&#x2013;2013 (Revision of IEEE Std 1609 2-2006)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2209903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2007.342872"},{"key":"ref11","first-page":"167","article-title":"Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack","author":"cramer","year":"2012","journal-title":"SIAM Journal on Computing 33"},{"key":"ref5","article-title":"Ad Hoc On-Demand Distance Vector (AODV) Routing","author":"perkins","year":"2003","journal-title":"rFC 3561"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838310"},{"key":"ref8","first-page":"338","article-title":"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method","volume":"5","author":"kurosawa","year":"2007","journal-title":"International Journal of Network Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.3.5.13-20"},{"key":"ref2","first-page":"1","article-title":"IEEE Guide for Wireless Access in Vehicular Environments (WAVE) - Architecture","year":"2014","journal-title":"IEEE Std 1609 0&#x2013;2013"},{"key":"ref9","first-page":"106","article-title":"A Trust-aware management strategy against black hole attacks in MANET","author":"yang","year":"2011","journal-title":"IEICE Commun Society Conf"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SETIT.2012.6481990"}],"event":{"name":"2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2015,8,5]]},"location":"Shanghai, China","end":{"date-parts":[[2015,8,7]]}},"container-title":["2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7227128\/7245317\/07245328.pdf?arnumber=7245328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:59:03Z","timestamp":1490403543000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7245328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ssic.2015.7245328","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}