{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T18:22:35Z","timestamp":1777573355181,"version":"3.51.4"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/uemcon47517.2019.8993045","type":"proceedings-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T08:36:46Z","timestamp":1581669406000},"page":"1117-1123","source":"Crossref","is-referenced-by-count":40,"title":["A Misbehavior Authority System for Sybil Attack Detection in C-ITS"],"prefix":"10.1109","author":[{"given":"Joseph","family":"Kamel","sequence":"first","affiliation":[]},{"given":"Farah","family":"Haidar","sequence":"additional","affiliation":[]},{"given":"Ines Ben","family":"Jemaa","sequence":"additional","affiliation":[]},{"given":"Arnaud","family":"Kaiser","sequence":"additional","affiliation":[]},{"given":"Brigitte","family":"Lonc","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"kamel","year":"2019","journal-title":"Github repository Framework for misbehavior detection (f2md)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-011-0038-9"},{"key":"ref13","article-title":"Framework For Misbehavior Detection (F2MD)","year":"2019","journal-title":"F2MD website"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2015.7385539"},{"key":"ref16","year":"0","journal-title":"University of Luxembourg"},{"key":"ref17","article-title":"V2X Validation Tool","author":"petit","year":"0","journal-title":"BlackHat 2018"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.13189\/csit.2014.020403","article-title":"Sybil Attack Detection in Vehicular Networks","author":"pouyan","year":"2014","journal-title":"Computer Science and Information Technology 2 4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270417"},{"key":"ref5","first-page":"1","article-title":"Cooperative sybil attack detection for position based applications in privacy preserved vanets","author":"hao","year":"0","journal-title":"IEEE Global Telecommunications Conf GLOBECOM 01"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"ref7","first-page":"1","article-title":"Security Policy & Governance Framework for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS)","year":"2017","journal-title":"Cooperative connected and automated mobility (CCAM)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2018.8628407"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885740"}],"event":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","location":"New York City, NY, USA","start":{"date-parts":[[2019,10,10]]},"end":{"date-parts":[[2019,10,12]]}},"container-title":["2019 IEEE 10th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966519\/8992916\/08993045.pdf?arnumber=8993045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T15:00:30Z","timestamp":1665846030000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8993045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/uemcon47517.2019.8993045","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}