{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:57:24Z","timestamp":1757311044239,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1145\/3584746","type":"journal-article","created":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T11:35:19Z","timestamp":1678880119000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Introduction to the Special Section on Cyber Security in Internet of Vehicles"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2440-2771","authenticated-orcid":false,"given":"Ching-Hsien","family":"Hsu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, Asia University, Taiwan; Department of Medical Research, China Medical University Hospital, China Medical University, Wufeng, Taichung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7593-8509","authenticated-orcid":false,"given":"Amir H.","family":"Alavi","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Pittsburgh, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2788-3451","authenticated-orcid":false,"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[{"name":"Department of Sciences and Informatics, Muroran Institute of Technology, Muroran, Hokkaido, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"e_1_3_1_2_2","article-title":"Improving security of internet of vehicles based on post- quantum signatures with systolic divisions","author":"Yi Haibo","year":"2023","unstructured":"Haibo Yi, Ruinan Chi, Xin Huang, Xuejun Cai, and Zhe Nie. 2023. Improving security of internet of vehicles based on post- quantum signatures with systolic divisions. ACM TOIT (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_3_2","article-title":"Efficient cryptographic hardware for safety message verification in internet of connected vehicles","author":"Mehrabi Mohamad Ali","year":"2023","unstructured":"Mohamad Ali Mehrabi and Alireza Jolfaei. 2023. Efficient cryptographic hardware for safety message verification in internet of connected vehicles. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_4_2","article-title":"Token-based authorization and authentication for secure internet of vehicles communication","author":"Manogaran Gunasekaran","year":"2023","unstructured":"Gunasekaran Manogaran, Bharat S. Rawal, Vijayalakshmi Saravanan, Priyan Malarvizhi Kumar, Qin Xin, and P. Mohamed Shakeel. 2023. Token-based authorization and authentication for secure internet of vehicles communication. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_5_2","article-title":"Driver identification using optimized deep learning model in smart transportation","author":"Ravi Chandrasekar","year":"2023","unstructured":"Chandrasekar Ravi, Anmol Tigga, G. Thippa Reddy, Saqib Hakak, and Mamoun Alazab. 2023. Driver identification using optimized deep learning model in smart transportation. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_6_2","article-title":"Pedestrian trajectory prediction using facial keypoints based convolutional encoder-decoder network","author":"Xiao Song","year":"2023","unstructured":"Song Xiao, Kai Chen, Xiaoxiang Ren, and Haitao Yuan. 2023. Pedestrian trajectory prediction using facial keypoints based convolutional encoder-decoder network. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_7_2","article-title":"Identity-based public auditing for cloud storage of internet-of-vehicles data","author":"Tian Hui","year":"2023","unstructured":"Hui Tian, Fang Peng, Hanyu Quan, and Chin-Chen Chang. 2023. Identity-based public auditing for cloud storage of internet-of-vehicles data. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_8_2","article-title":"Deep learning-based network traffic prediction for secure backbone networks in internet of vehicles","author":"Wang Xiaojie","year":"2023","unstructured":"Xiaojie Wang, Laisen Lie, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, and Neeraj Kumar. 2023. Deep learning-based network traffic prediction for secure backbone networks in internet of vehicles. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_9_2","article-title":"CARES: Context-aware trust estimation for realtime crowdsensing services in vehicular edge networks","author":"Jang Si Young","year":"2023","unstructured":"Si Young Jang, Sung Kyu Park, Jin Hee Cho, and Dongman Lee. 2023. CARES: Context-aware trust estimation for realtime crowdsensing services in vehicular edge networks. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_10_2","article-title":"Providing reliable service for parked-vehicle-assisted mobile edge computing","author":"Zhou Ao","year":"2023","unstructured":"Ao Zhou, Xiao Ma, Siyi Gao, and Shangguang Wang. 2023. Providing reliable service for parked-vehicle-assisted mobile edge computing. ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_11_2","article-title":"Tripartite transmitting methodology for intermittently connected mobile network (ICMN)","author":"Sekaran Ramesh","year":"2023","unstructured":"Ramesh Sekaran, Fadi Al-Turjman, Rizwan Patan, and Velmani Ramasamy. 2023. Tripartite transmitting methodology for intermittently connected mobile network (ICMN). ACM TOIT. (2023).","journal-title":"ACM TOIT"},{"key":"e_1_3_1_12_2","article-title":"PPRP: Preserving-Privacy route planning scheme in VANETs","author":"Liang Yangfan","year":"2023","unstructured":"Yangfan Liang, Yining Liu, and Brij B. Gupta. 2023. PPRP: Preserving-Privacy route planning scheme in VANETs. ACM TOIT. (2023).","journal-title":"ACM TOIT"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584746","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:37Z","timestamp":1750182697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584746"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3584746"],"URL":"https:\/\/doi.org\/10.1145\/3584746","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2022,11,30]]},"assertion":[{"value":"2023-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}