iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/NCA57778.2022.10013565
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:44:25Z","timestamp":1730285065888,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/nca57778.2022.10013565","type":"proceedings-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:28:06Z","timestamp":1673897286000},"page":"243-249","source":"Crossref","is-referenced-by-count":0,"title":["SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs"],"prefix":"10.1109","author":[{"given":"Giovanni Gambigliani","family":"Zoccoli","sequence":"first","affiliation":[{"name":"University of Modena and Reggio Emilia,Department of Engineering \"Enzo Ferrari\""}]},{"given":"Francesco","family":"Pollicino","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia,Department of Engineering \"Enzo Ferrari\""}]},{"given":"Dario","family":"Stabili","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia,Department of Engineering \"Enzo Ferrari\""}]},{"given":"Mirco","family":"Marchetti","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia,Department of Engineering \"Enzo Ferrari\""}]}],"member":"263","reference":[{"article-title":"Ad hoc wireless networks: Protocols and systems","volume-title":"USA, Tech. Rep.","year":"2001","author":"Toh","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1016\/B978-0-12-809266-8.00002-8","article-title":"Chapter 2 - intelligent transportation systems","volume-title":"Intelligent Vehicular Networks and Communications.","author":"Paul","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRI55461.2022.00023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891068"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3190721"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2984878"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448656"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2019.8757500"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425381"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348712"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149132"},{"issue":"11","key":"ref14","article-title":"IEEE standard for information technology\u2013telecommunications and information exchange between systems\u2013local and metropolitan area networks\u2013specific requirements\u2013part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: Wireless access in vehicular environments","volume":"802","year":"2010","journal-title":"IEEE Std"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2019.8686445"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4271\/j2735_200612"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_10"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3122333"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2011.6082856"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5772\/51314"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2017.2666585"}],"event":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2022,12,14]]},"location":"Boston, MA, USA","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10013484\/10013503\/10013565.pdf?arnumber=10013565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T04:23:13Z","timestamp":1712982193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/nca57778.2022.10013565","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}