{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:26:46Z","timestamp":1722943606089},"reference-count":20,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2017]]},"DOI":"10.12720\/jcm.12.4.214-220","type":"journal-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T09:43:01Z","timestamp":1514454181000},"source":"Crossref","is-referenced-by-count":3,"title":["Bayesian Trust Scheme: A Decentralized Safety Message Trust Method in Multi-Hop V2V Networks"],"prefix":"10.12720","author":[{"name":"DSST - Lebanese University, Lebanon, Beirut","sequence":"first","affiliation":[]},{"given":"Hanaa S.","family":"Basheer","sequence":"first","affiliation":[]},{"given":"Carole","family":"Bassil","sequence":"additional","affiliation":[]},{"given":"Bilal","family":"Chebaro","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2017]]},"reference":[{"issue":"no. 2","key":"ref0","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MITS.2010.938166","article-title":"Emergency services in future intelligent transportation systems based on vehicular communication networks","volume":"2","author":"Martinez","year":"2010","unstructured":"[1] F. J. Martinez, C. K. Toh, J. C. Cano, C. T. Calafate, and P. Manzoni, \"Emergency services in future intelligent transportation systems based on vehicular communication networks,\" IEEE Intelligent Transportation Systems Magazine, vol. 2, no. 2, pp. 6-20, 2010.","journal-title":"IEEE Intelligent Transportation Systems Magazine"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2008.180","article-title":"On data-centric trust establishment in ephemeral ad hoc networks","author":"Raya","year":"2008","unstructured":"[2] M. Raya, P. Papadimitratos, V. D. Gligory, and J. P. Hubaux, \"On data-centric trust establishment in ephemeral ad hoc networks,\" in Proc. INFOCOM. The 27th Conference on Computer Communications, Phoenix, USA, Apr. 2008, pp. 1238-1246."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9780203491294","volume-title":"Bayesian Artificial Intelligent","author":"Korb","year":"2003","unstructured":"[3] K. B. Korb and A. E. Nicholson, Bayesian Artificial Intelligent, Chapman and Hall\/CRC, 2003."},{"key":"ref3","unstructured":"4. A. Soua, \"Vehicular ad hoc networks: Dissemination, data collection and routing: Models and algorithms,\" thesis report to obtain the degree of Doctorate, University Pierre et Marie Curie, Institute Mines-Telecom, Paris, Dec. 2013. [5] R. Naja, \"Wireless vehicular networks for car collision avoidance,\" in eBook by Springer Science and Business Media, New York, 2013."},{"key":"ref4","unstructured":"5. R. Kumar and M. Dave, \"A review of various VANET data dissemination protocols,\" International Journal of uand e- Service, Science and Technology, vol. 5, no. 3, September 2012."},{"issue":"no. 3","key":"ref5","first-page":"784","article-title":"A review of information dissemination protocols for vehicular ad hoc networks","volume":"14","author":"Panichpapiboon","year":"2012","unstructured":"[7] S. Panichpapiboon and W. Pattara-Atikom, \"A review of information dissemination protocols for vehicular ad hoc networks,\" Communications Surveys & Tutorials, vol. 14, no. 3, pp. 784-798, 2012.","journal-title":"Communications Surveys & Tutorials"},{"issue":"no. 1","key":"ref6","article-title":"Towards expanded trust management for agents in vehicular adhoc networks","volume":"5","author":"Farooq","year":"2010","unstructured":"[8] U. Farooq, J. Zhang, T. Tran, and R. Cohen, \"Towards expanded trust management for agents in vehicular adhoc networks,\" International Journal of Computational Intelligence Theory and Practice, vol. 5, no. 1, 2010.","journal-title":"International Journal of Computational Intelligence Theory and Practice"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/glocomw.2008.ecp.63","article-title":"Modeling roadside attacker behavior in VANETs","author":"Leinmuller","year":"2008","unstructured":"[9] T. Leinmuller, R. K. Schmidt, E. Schoch, A. Held, and G. Schafer, \"Modeling roadside attacker behavior in VANETs,\" in Proc. GLOBECOM Workshops, New Orleans, LO, IEEE, Nov. 30-Dec. 4, 2008."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/aina.2011.86","article-title":"A survey on trust management for VANETs","volume-title":"Proc International Conference on Advanced Information Networking and Applications","author":"Zhang","year":"2011","unstructured":"[10] J. Zhang, \"A survey on trust management for VANETs,\" in Proc. International Conference on Advanced Information Networking and Applications, 2011."},{"key":"ref9","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/WOWMOM.2005.109","article-title":"Vars: A Vehicle Ad-hoc Network Reputation System","volume-title":"Proc 6th IEEE International Symposium World of Wireless Mobile and Multimedia Networks","author":"D\u00f6tzer","year":"2005","unstructured":"[11] F. D\u00f6tzer, L. Fischer, and P. Magiera, \"Vars: A Vehicle Ad-hoc Network Reputation System,\" in Proc. 6th IEEE International Symposium World of Wireless Mobile and Multimedia Networks, 2005, pp. 454-456."},{"key":"ref10","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-642-35416-8_23","volume-title":"Efficient self-organized trust management in location privacy enhanced VANETs","author":"Wei","year":"2012","unstructured":"[12] Y. C. Wei and Y. M. Chen, \"Efficient self-organized trust management in location privacy enhanced VANETs,\" Information Security Applications, Springer Berlin Heidelberg, 2012, pp. 328-344."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/csnt.2013.103","article-title":"Trust Computation in VANETs","volume-title":"Proc International Conference on Communication Systems and Network Technologies","author":"Chaurasia","year":"2013","unstructured":"[13] B. K. Chaurasia, S. Verma, and G. S. Tomar, \"Trust Computation in VANETs,\" in Proc. International Conference on Communication Systems and Network Technologies, 2013."},{"key":"ref12","unstructured":"13. D. Saraswat and C. P. Bhargava, \"Trust computation techniques in VANETS,\" International Journal of Application or Innovation in Engineering & Management, vol. 4, no. 7, July 2015."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/waina.2016.28","article-title":"A framework for disseminating safety message in V2V communication","volume-title":"Proc 30th International Conference on Advance Information Networking and Applications Workshops","author":"Basheer","year":"2016","unstructured":"[15] H. Basheer, C. Bassil, and B. Chebaro, \"A framework for disseminating safety message in V2V communication,\" in Proc. 30th International Conference on Advance Information Networking and Applications Workshops, Switzerland, 2016."},{"key":"ref14","volume-title":"A First Course in Probability","author":"Ross","year":"2010","unstructured":"[16] S. Ross, A First Course in Probability, 8th edition, Textbook by Pearson Education, Inc., USA, 2010."},{"key":"ref15","unstructured":"16. S. G. Charlton and P. H. Baas, \"Speed change management for new Zealand roads,\" Land Transport New Zealand Research Report 300, 2006."},{"key":"ref16","unstructured":"17. T. Sando, \"Modeling highway crashes using bayesian belief networks technique and GIS,\" Ph.D. theses submitted to the Department Civil & Environmental Engineering, Florida state Univ., 2005."},{"key":"ref17","article-title":"Prediction under bayesian approach of car accidents in urban intersections","volume-title":"Proc 3rd International Conference on Road Safety and Simulation","author":"Rosas-Jaimes","unstructured":"[19] O. A. Rosas-Jaimes, A. C. Campero-Carmona, and O. L. S\u00e1nchez-Flores, \"Prediction under bayesian approach of car accidents in urban intersections,\" in Proc. 3rd International Conference on Road Safety and Simulation, Indianapolis, USA, Sept. 14-16, 2011."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.1306","article-title":"A trusted routing protocol based on Bayesian in VANET","volume-title":"Proc International Conference on Cyberspace Technology","author":"Wu","year":"2014","unstructured":"[20] Q. Wu and Q. Liu, \"A trusted routing protocol based on Bayesian in VANET,\" in Proc. International Conference on Cyberspace Technology, 2014."},{"key":"ref19","volume-title":"Pattern Classification","author":"Duda","year":"1997","unstructured":"[21] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2nd edition, New York: Wiley, 1997."}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2017\/0428\/20170428024046975.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T01:56:16Z","timestamp":1550022976000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=175&id=1099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":20,"URL":"https:\/\/doi.org\/10.12720\/jcm.12.4.214-220","relation":{},"ISSN":["1796-2021"],"issn-type":[{"type":"print","value":"1796-2021"}],"subject":[],"published":{"date-parts":[[2017]]}}}