{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:40:13Z","timestamp":1773409213091,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2507924.2507927","type":"proceedings-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T19:30:29Z","timestamp":1383766229000},"page":"405-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Solution of detecting jamming attacks in vehicle ad hoc networks"],"prefix":"10.1145","author":[{"given":"Anh Tuan","family":"Nguyen","sequence":"first","affiliation":[{"name":"University of Paris-Est, Cr\u00e9teil, France"}]},{"given":"Lynda","family":"Mokdad","sequence":"additional","affiliation":[{"name":"University of Paris-Est, Cr\u00e9teil, France"}]},{"given":"Jalel","family":"Ben Othman","sequence":"additional","affiliation":[{"name":"University of Paris 13, Villetaneuse, France"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/ieee 802.11p.  http:\/\/en.wikipedia.org\/wiki\/ieee 802.11p."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/ieee 802.11e-2005.  http:\/\/en.wikipedia.org\/wiki\/ieee 802.11e-2005."},{"key":"e_1_3_2_1_3_1","volume-title":"Wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6: Wireless access in vehicular environments. Technical report","author":"Part","year":"2010","unstructured":"Part 11 : Wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6: Wireless access in vehicular environments. Technical report , IEEE , 2010 . Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications amendment 6: Wireless access in vehicular environments. Technical report, IEEE, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"Detection of radio interference attacks in vanet","author":"Ali Hamieh Lynda Mokdad","year":"2009","unstructured":"Lynda Mokdad Ali Hamieh , Jalel Ben-Othman . Detection of radio interference attacks in vanet . IEEE \"GLOBECOM\" 2009 proceedings, 2009. Lynda Mokdad Ali Hamieh, Jalel Ben-Othman. Detection of radio interference attacks in vanet. IEEE \"GLOBECOM\" 2009 proceedings, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"e_1_3_2_1_6_1","volume-title":"On the necessity of accurate ieee 802.11p models for ivc protocol simulation","author":"David Eckhoff Christoph Sommery","year":"2011","unstructured":"Christoph Sommery David Eckhoff and Falko Dressler . On the necessity of accurate ieee 802.11p models for ivc protocol simulation . 2011 . Christoph Sommery David Eckhoff and Falko Dressler. On the necessity of accurate ieee 802.11p models for ivc protocol simulation. 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"International Journal of Communication Networks and Information Security (IJCNIS), 3","author":"Mishra Sumita","year":"2011","unstructured":"Sumita Mishra , Geethapriya Thamilarasu , and Ramalingam Sridhar . Improving reliability of jamming attack detection in ad hoc networks . International Journal of Communication Networks and Information Security (IJCNIS), 3 , 2011 . Sumita Mishra, Geethapriya Thamilarasu, and Ramalingam Sridhar. Improving reliability of jamming attack detection in ad hoc networks. International Journal of Communication Networks and Information Security (IJCNIS), 3, 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"Irshad Ahmed Soomro. Denial of service (dos) attack and its possible solutions in vanet","author":"Halabi Hasbullah Ab Manan","year":"2010","unstructured":"Jamalul-lail Ab Manan Halabi Hasbullah , Irshad Ahmed Soomro. Denial of service (dos) attack and its possible solutions in vanet . World Academy of Science , Engineering and Technology 65, 2010 . Jamalul-lail Ab Manan Halabi Hasbullah, Irshad Ahmed Soomro. Denial of service (dos) attack and its possible solutions in vanet. World Academy of Science, Engineering and Technology 65, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Science Journal","author":"Ahmed Sumra Rehman Irshad","year":"2011","unstructured":"Jamalul-lail Masood-ur- Rehman Irshad Ahmed Sumra , Halabi Hasbullah . Trust and trusted computing in vanet . Computer Science Journal , 2011 . Jamalul-lail Masood-ur-Rehman Irshad Ahmed Sumra, Halabi Hasbullah. Trust and trusted computing in vanet. Computer Science Journal, 2011."},{"key":"e_1_3_2_1_10_1","first-page":"2036","volume-title":"VTC Spring'08","author":"Jiang Daniel","year":"2008","unstructured":"Daniel Jiang and Luca Delgrossi . Ieee 802.11p : Towards an international standard for wireless access in vehicular environments . In VTC Spring'08 , pages 2036 -- 2040 , 2008 . Daniel Jiang and Luca Delgrossi. Ieee 802.11p: Towards an international standard for wireless access in vehicular environments. In VTC Spring'08, pages 2036--2040, 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"Journal of Selected Areas in Telecommunications (JSAT)","author":"Barend","year":"2011","unstructured":"Barend J. van Wyk Lusheng Miao, Karim Djouani and Yskandar Hamam. A survey of ieee 802.11p mac protocol. Multidisciplinary Journals in Science and Technology , Journal of Selected Areas in Telecommunications (JSAT) , 2011 . Barend J. van Wyk Lusheng Miao, Karim Djouani and Yskandar Hamam. A survey of ieee 802.11p mac protocol. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"Securing vehicular communications. 13:8--15","author":"Hubaux Maxim Raya Jean-Pierre","year":"2006","unstructured":"Jean-Pierre Hubaux Maxim Raya , Panos Papadimitratos . Securing vehicular communications. 13:8--15 , 2006 . Jean-Pierre Hubaux Maxim Raya, Panos Papadimitratos. Securing vehicular communications. 13:8--15, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.666330"},{"key":"e_1_3_2_1_14_1","volume-title":"Sungjoon Choi and Yanghee Choi. A solicitation-based ieee 802.11p mac protocol for roadside to vehicular networks","author":"Seokt Yongho","year":"2007","unstructured":"Yongho Seokt , Taekyoung Kwon , Nakjung Choi , Sungjoon Choi and Yanghee Choi. A solicitation-based ieee 802.11p mac protocol for roadside to vehicular networks . 2007 . Yongho Seokt, Taekyoung Kwon, Nakjung Choi, Sungjoon Choi and Yanghee Choi. A solicitation-based ieee 802.11p mac protocol for roadside to vehicular networks. 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"The security of vehicular ad hoc networks","author":"Raya Maxim","year":"2004","unstructured":"Maxim Raya and JeanPierre Hubaux . The security of vehicular ad hoc networks . 2004 . Maxim Raya and JeanPierre Hubaux. The security of vehicular ad hoc networks. 2004."},{"key":"e_1_3_2_1_16_1","unstructured":"Rohde and Schwarz. Wlan 802.11p measurements for vehicle to vehicle (v2v) dsrc.  Rohde and Schwarz. Wlan 802.11p measurements for vehicle to vehicle (v2v) dsrc."},{"key":"e_1_3_2_1_17_1","volume-title":"Ray Hunt. Vehicular ad hoc networks (vanets): status, results, and challenges.","author":"Chen Yuh-Shyan","year":"2010","unstructured":"Yuh-Shyan Chen , Angela Irwin-Aamir , Hassan Sherali Zeadally , Ray Hunt. Vehicular ad hoc networks (vanets): status, results, and challenges. 2010 . Yuh-Shyan Chen, Angela Irwin-Aamir, Hassan Sherali Zeadally, Ray Hunt. Vehicular ad hoc networks (vanets): status, results, and challenges. 2010."},{"key":"e_1_3_2_1_18_1","volume-title":"The feasibility of launching and detecting jamming attacks in wireless networks","author":"Xu Y. Zhang W.","year":"2005","unstructured":"Y. Zhang W. Xu , W. Trappe and T. Wood . The feasibility of launching and detecting jamming attacks in wireless networks . 2005 . Y. Zhang W. Xu, W. Trappe and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2008.4640898"}],"event":{"name":"MSWiM '13: 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Barcelona Spain","acronym":"MSWiM '13","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 16th ACM international conference on Modeling, analysis &amp; simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507924.2507927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2507924.2507927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:29Z","timestamp":1750231709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507924.2507927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":19,"alternative-id":["10.1145\/2507924.2507927","10.1145\/2507924"],"URL":"https:\/\/doi.org\/10.1145\/2507924.2507927","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}