{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:24:55Z","timestamp":1771230295213,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369017","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing vehicular ad-hoc networks security using intrusion detection system techniques"],"prefix":"10.1145","author":[{"given":"Meriem","family":"Houmer","sequence":"first","affiliation":[{"name":"Moulay-Ismail University, Meknes, Morocco"}]},{"given":"Moulay Lahcen","family":"Hasnaoui","sequence":"additional","affiliation":[{"name":"Moulay-Ismail University, Meknes, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCT.2016.7777397"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016910582"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2283-z"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/745303"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5547-8_34"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201815006038"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7158098"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1963-8"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"8","article-title":"Attacks on vanet security","volume":"9","author":"Upadhyaya A. N.","year":"2018","unstructured":"Upadhyaya , A. N. , & Shah , J. S. ( 2018 ). Attacks on vanet security . Int J Comp Eng Tech , 9 ( 1 ), 8 -- 19 . Upadhyaya, A. N., & Shah, J. S. (2018). Attacks on vanet security. Int J Comp Eng Tech, 9(1), 8--19.","journal-title":"Int J Comp Eng Tech"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290511.3290569"},{"key":"e_1_3_2_1_11_1","volume-title":"International Journal of Network Security & Its Applications (IJNSA)","author":"Mina Rahbari","year":"2011","unstructured":"Mina Rahbari and Mohammad Ali Jabreil Jamali, \" Efficient Detection Of Sybil Attack Based On Cryptography In Vanet\". International Journal of Network Security & Its Applications (IJNSA) , Vol. 3 , No .6, 2011 . Mina Rahbari and Mohammad Ali Jabreil Jamali, \"Efficient Detection Of Sybil Attack Based On Cryptography In Vanet\". International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"International Journal of Advanced Research in Computer Science","author":"Namarpreet Kaur","year":"2015","unstructured":"Namarpreet Kaur and Aman Arora, \"A Review on Security Issues in VANET\" , International Journal of Advanced Research in Computer Science , Vol. 6 , No .2, 2015 . Namarpreet Kaur and Aman Arora, \"A Review on Security Issues in VANET\", International Journal of Advanced Research in Computer Science, Vol.6, No.2, 2015."},{"key":"e_1_3_2_1_13_1","first-page":"42","volume-title":"Journal of Network and Computer Applications, 36(1)","author":"Modi C.","year":"2013","unstructured":"Modi , C. , Patel , D. , Patel , H. , Borisaniya , B. , Patel , A. & Rajarajan , M.. \"A survey of intrusion detection techniques in Cloud \". Journal of Network and Computer Applications, 36(1) , pp. 42 -- 57 , 2013 . Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M.. \"A survey of intrusion detection techniques in Cloud\". Journal of Network and Computer Applications, 36(1), pp. 42--57, 2013."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE International Conference on Communications Workshops","author":"Jorge Hortelano","year":"2010","unstructured":"Jorge Hortelano , Juan Carlos Ruiz and Pietro Manzoni, \" Evaluating the uselfusness of watchdogs for intrusion detection in VANETs \", IEEE International Conference on Communications Workshops , 2010 . Jorge Hortelano, Juan Carlos Ruiz and Pietro Manzoni, \"Evaluating the uselfusness of watchdogs for intrusion detection in VANETs\", IEEE International Conference on Communications Workshops, 2010."}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","location":"Casablanca Morocco","acronym":"SCA2019"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:27Z","timestamp":1750202607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":14,"alternative-id":["10.1145\/3368756.3369017","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369017","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}