{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:35:43Z","timestamp":1773315343754,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/vetecf.2011.6093096","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T21:01:27Z","timestamp":1323205287000},"page":"1-5","source":"Crossref","is-referenced-by-count":115,"title":["On Data-Centric Misbehavior Detection in VANETs"],"prefix":"10.1109","author":[{"given":"Sushmita","family":"Ruj","sequence":"first","affiliation":[]},{"given":"Marcos A.","family":"Cavenaghi","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Stojmenovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"raya","year":"2009","journal-title":"Data-centric Trust in Ephemeral Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653698"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550363"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.129"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861384"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451013"},{"key":"ref4","first-page":"251","article-title":"The sybil attack","volume":"2429","author":"douceur","year":"2002","journal-title":"IPTPS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1151374.1151381"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref1","article-title":"Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective","author":"bai","year":"2006","journal-title":"Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet)"},{"key":"ref9","article-title":"Challenges in security vehicular networks","author":"parno","year":"2005","journal-title":"Hotnets-IV"}],"event":{"name":"2011 IEEE Vehicular Technology Conference (VTC Fall)","location":"San Francisco, CA, USA","start":{"date-parts":[[2011,9,5]]},"end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 IEEE Vehicular Technology Conference (VTC Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6088025\/6092796\/06093096.pdf?arnumber=6093096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:52:39Z","timestamp":1490104359000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6093096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/vetecf.2011.6093096","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}