{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:52Z","timestamp":1750220812622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342028","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["VANET's Security Concerns and Solutions"],"prefix":"10.1145","author":[{"given":"Muhammad Noman","family":"Javed","sequence":"first","affiliation":[{"name":"Department of Computer Science, National University of Computer and Emerging Sciences, Chiniot-Faisalabad Campus, Pakistan"}]},{"given":"Hammad","family":"Shafiq","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National University of Computer and Emerging Sciences, Chiniot-Faisalabad Campus, Pakistan"}]},{"given":"Khubaib Amjad","family":"Alam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National University of Computer and Emerging Sciences, Chiniot-Faisalabad Campus, Pakistan"}]},{"given":"Abid","family":"Jamil","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National University of Computer and Emerging Sciences, Chiniot-Faisalabad Campus, Pakistan"}]},{"given":"Muhammad Umar","family":"Sattar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National University of Computer and Emerging Sciences, Chiniot-Faisalabad Campus, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Karagiannis G. Altintas O. Ekici E. Heijenk G. Jarupan B. Lin K. and Weil T. 2011. Vehicular networking: A survey and tutorial on requirements architectures challenges standards and solutions. IEEE communications surveys tutorials 13(4) pp.584--616.  Karagiannis G. Altintas O. Ekici E. Heijenk G. Jarupan B. Lin K. and Weil T. 2011. Vehicular networking: A survey and tutorial on requirements architectures challenges standards and solutions. IEEE communications surveys tutorials 13(4) pp.584--616.","DOI":"10.1109\/SURV.2011.061411.00019"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370616.1370618"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110103"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"volume-title":"Proc. 2nd Symp. WSCN (pp.1--10)","author":"Goudarzi S.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Moher David etal \"Preferred reporting items for systematic reviews and metaanalyses: the PRISMAstatement.\" International journal of surgery 8.5 (2010): 336--341.  Moher David et al. \"Preferred reporting items for systematic reviews and metaanalyses: the PRISMAstatement.\" International journal of surgery 8.5 (2010): 336--341.","DOI":"10.1016\/j.ijsu.2010.02.007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668260.2668262"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132062.3132065"},{"volume-title":"Computer-Aided Design (ICCAD), 2017 IEEE\/ACM International Conference on (pp. 984--991)","author":"Zheng B.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746273"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766500"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512921.2512928"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178212.3178231"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1161-5"},{"volume-title":"Proceedings of the International Conference on Soft Computing Systems (pp. 675--688)","author":"Thenmozhi T.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.134"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.02.001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2015.01.003"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Tyagi P. and Dembla D. 2017. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET).Egyptian Informatics Journal 18(2) pp.133--139.  Tyagi P. and Dembla D. 2017. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET).Egyptian Informatics Journal 18(2) pp.133--139.","DOI":"10.1016\/j.eij.2016.11.003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.024"},{"volume-title":"Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 149--154)","author":"Smitha A.","key":"e_1_3_2_1_30_1"},{"volume-title":"Information Security and Cryptology (ISCISC), 2015 12th International Iranian Society of Cryptology Conference on (pp. 23--28)","author":"Alimohammadi M.","key":"e_1_3_2_1_31_1"},{"volume-title":"Computing and Communication Workshop and Conference (CCWC)","year":"2017","author":"Mohamed M.S.","key":"e_1_3_2_1_32_1"},{"volume-title":"Computer and Information Sciences (ICCOINS), 2014 International Conference on (pp. 1--6). IEEE.","author":"Verma K.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.005"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.10.003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742854.2745718"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639968.2640059"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3906-4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Bao S. Hathal W. Cruickshank H. Sun Z. Asuquo P. and Lei A. 2017. A lightweight authentication andprivacy-preserving scheme for VANETs using TESLA and Bloom Filters. ICT Express.  Bao S. Hathal W. Cruickshank H. Sun Z. Asuquo P. and Lei A. 2017. A lightweight authentication andprivacy-preserving scheme for VANETs using TESLA and Bloom Filters. ICT Express.","DOI":"10.1016\/j.icte.2017.12.001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Islam S.H. Obaidat M.S. Vijayakumar P. Abdulhay E. Li F. and Reddy M.K.C. 2017. A robust andefficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Systems.  Islam S.H. Obaidat M.S. Vijayakumar P. Abdulhay E. Li F. and Reddy M.K.C. 2017. A robust andefficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Systems.","DOI":"10.1016\/j.future.2017.07.002"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.11.012"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.03.001"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.016"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.09.009"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.06.098"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.01.002"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.03.011"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Mondal A. and Mitra S. 2018. Extending security horizon through identification authentication andtracking services in hierarchical vehicular networks. Computers and Electrical Engineering.  Mondal A. and Mitra S. 2018. Extending security horizon through identification authentication andtracking services in hierarchical vehicular networks. Computers and Electrical Engineering.","DOI":"10.1016\/j.compeleceng.2018.01.020"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Kang J. Lin D. Jiang W. and Bertino E. 2018. Highly efficient randomized authentication in VANETs.Pervasive and Mobile Computing 44 pp.31--44  Kang J. Lin D. Jiang W. and Bertino E. 2018. Highly efficient randomized authentication in VANETs.Pervasive and Mobile Computing 44 pp.31--44","DOI":"10.1016\/j.pmcj.2018.01.004"},{"key":"e_1_3_2_1_50_1","first-page":"282","article-title":". Trust-based Scheme for Alert Spreading in VANET","volume":"73","author":"Ltifi A.","year":"2015","journal-title":"ProcediaComputer Science"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.004"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.05.006"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.08.002"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7787005"},{"volume-title":"Computer Engineering and Systems (ICCES)","year":"2017","author":"Ahmed I.Z.","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2402166"},{"volume-title":"Electronics and Mobile Communication Conference (UEMCON)","year":"2017","author":"Lim K.","key":"e_1_3_2_1_57_1"},{"volume-title":"Advanced Networks and Telecommunications Systems (ANTS), 2016 IEEE International Conference on (pp. 1--6). IEEE.","author":"Mondal A.","key":"e_1_3_2_1_58_1"},{"volume-title":"Consumer Communications and Networking Conference (CCNC)","year":"2016","author":"Mejri M.N.","key":"e_1_3_2_1_59_1"},{"volume-title":"Ubiquitous Wireless Broadband (ICUWB), 2016 IEEE International Conference on (pp. 1--4). IEEE.","author":"Chen C.","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","first-page":"25","volume-title":"Vehicular Networking Conference (VNC)","author":"F\u00f6rster D.","year":"2014"},{"volume-title":"Communications (ICC), 2017 IEEE International Conference on (pp. 1--6). IEEE.","author":"Bendouma A.","key":"e_1_3_2_1_62_1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2718101"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.246"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162"},{"key":"e_1_3_2_1_66_1","first-page":"1","volume-title":"Wireless Telecommunications Symposium (WTS)","author":"Diep P.T.N.","year":"2016"},{"volume-title":"Computers and Communications (ISCC), 2017 IEEE Symposium on (pp. 59--63)","author":"Bouksani W.","key":"e_1_3_2_1_67_1"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6969711"},{"volume-title":"2017 International Conference on Communication Technologies (ComTech) (pp. 132--137)","author":"Ullah I.","key":"e_1_3_2_1_69_1"},{"volume-title":"Computer Engineering and Systems (ICCES), 2017 12th International Conference on (pp. 592--599)","author":"Ali A.S.","key":"e_1_3_2_1_70_1"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2206111"},{"volume-title":"Wireless Communications and Mobile Computing Conference (IWCMC)","year":"2014","author":"Baiad R.","key":"e_1_3_2_1_72_1"},{"key":"e_1_3_2_1_73_1","first-page":"287","volume-title":"Vehicular Networking Conference (VNC)","author":"Dietzel S.","year":"2015"},{"volume-title":"Computational Intelligence (SSCI), 2016 IEEE Symposium Series on (pp. 1--8). IEEE.","author":"Al Najada H.","key":"e_1_3_2_1_74_1"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Kerrache C.A. Calafate C.T. Lagraa N. Cano J.C. and Manzoni P. 2016 July. Trust-Aware Opportunistic Dissemination Scheme for VANET Safety Applications. In Ubiquitous Intelligence and Computing Advanced and Trusted Computing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld) 2016 Intl IEEE Conferences (pp. 153--160). IEEE.  Kerrache C.A. Calafate C.T. Lagraa N. Cano J.C. and Manzoni P. 2016 July. Trust-Aware Opportunistic Dissemination Scheme for VANET Safety Applications. In Ubiquitous Intelligence and Computing Advanced and Trusted Computing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld) 2016 Intl IEEE Conferences (pp. 153--160). IEEE.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0044"},{"volume-title":"Communications (ICC), 2017 IEEE International Conference on (pp. 1--6).IEEE","author":"Dahmane S.","key":"e_1_3_2_1_76_1"},{"key":"e_1_3_2_1_77_1","first-page":"135","volume-title":"Vehicular Networking Conference (VNC)","author":"Dietzel S.","year":"2014"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Ahmed Kazi J.Lee Myung J.Li Jie \"Layered scalable WAVE security for VANET\" 2015 Proceedings - IEEEMilitary Communications Conference MILCOM.  Ahmed Kazi J.Lee Myung J.Li Jie \"Layered scalable WAVE security for VANET\" 2015 Proceedings - IEEEMilitary Communications Conference MILCOM.","DOI":"10.1109\/MILCOM.2015.7357668"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.015"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.03.060","article-title":"An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks","volume":"451","author":"Cui J.","year":"2018","journal-title":"Information Sciences"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.199"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.09.005"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.024"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.005"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","unstructured":"Rupareliya J. Vithlani S. and Gohel C. 2016. Securing VANET by preventing attacker node using watchdog and Bayesian network theory. Procedia computer science 79 pp.649--656.  Rupareliya J. Vithlani S. and Gohel C. 2016. Securing VANET by preventing attacker node using watchdog and Bayesian network theory. Procedia computer science 79 pp.649--656.","DOI":"10.1016\/j.procs.2016.03.082"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.12.005"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.06.003"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.198"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2717999"},{"volume-title":"Iranian Conference on (pp. 602--606)","author":"Hamed H.","key":"e_1_3_2_1_91_1"},{"volume-title":"November. Real-Time Detection and Mitigation of DDoS Attacks inIntelligent Transportation Systems. In 2018 21st International Conference on Intelligent TransportationSystems (ITSC) (pp. 157--163)","author":"Haydari A.","key":"e_1_3_2_1_92_1"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864111"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Zhong H. Huang B. Cui J. Li J. and Sha K. 2018 July. Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. In 2018 27th International Conference on Computer Communication and Networks (ICCCN) (pp. 1--8). IEEE.  Zhong H. Huang B. Cui J. Li J. and Sha K. 2018 July. Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. In 2018 27th International Conference on Computer Communication and Networks (ICCCN) (pp. 1--8). IEEE.","DOI":"10.1109\/ICCCN.2018.8487337"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"crossref","unstructured":"Vasudev H. and Das D. 2018 October. A Lightweight Authentication Protocol for V2V Communication in VANETs. In 2018 IEEE SmartWorld Ubiquitous Intelligence and Computing Advanced and TrustedComputing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart City Innovation( SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI) (pp. 1237--1242).IEEE.  Vasudev H. and Das D. 2018 October. A Lightweight Authentication Protocol for V2V Communication in VANETs. In 2018 IEEE SmartWorld Ubiquitous Intelligence and Computing Advanced and TrustedComputing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart City Innovation( SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI) (pp. 1237--1242).IEEE.","DOI":"10.1109\/SmartWorld.2018.00215"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2839979"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2833849"},{"volume-title":"September. Trust Management Based on Node Stay Time in VANET. In 2018 International Conference on Advances in Computing, Communications and Informatics(ICACCI) (pp. 242--248)","author":"Koirala B.","key":"e_1_3_2_1_99_1"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"],"location":"Paris France","acronym":"ICFNDS '19"},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342028"}},"subtitle":["A Systematic Literature Review"],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":98,"alternative-id":["10.1145\/3341325.3342028","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342028","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}