{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:51:37Z","timestamp":1773777097756,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/vnc.2017.8275598","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T16:47:15Z","timestamp":1517503635000},"page":"45-52","source":"Crossref","is-referenced-by-count":80,"title":["Analyzing attacks on cooperative adaptive cruise control (CACC)"],"prefix":"10.1109","author":[{"given":"Rens","family":"van der Heijden","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Lukaseder","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2328439"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7881000"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523658"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2307888.2307915"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil Attack","volume":"2429","author":"douceur","year":"2002","journal-title":"Peer-to-Peer Systems Ser Lecture Notes in Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0001-4575(93)90102-3"},{"key":"ref17","article-title":"Safe road trains for environment: Human factors' aspects in dual mode transport systems","author":"larburu","year":"2010","journal-title":"ITS World Congress"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1145\/2714576.2714619","article-title":"Vehicular platooning in an adversarial environment","author":"dadras","year":"2015","journal-title":"Proceedings of the 10th ACM Symposium on Information Computer and Communications Security ser ASIA CCS'15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766505"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2014.7013309"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.39"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-1433-9","author":"rajamani","year":"2012","journal-title":"Vehicle Dynamics and Control"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2410831"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2013.6728397"}],"event":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","location":"Torino","start":{"date-parts":[[2017,11,27]]},"end":{"date-parts":[[2017,11,29]]}},"container-title":["2017 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267164\/8275590\/08275598.pdf?arnumber=8275598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T15:52:51Z","timestamp":1660405971000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8275598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/vnc.2017.8275598","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}