Hyunjae Kang , Thanh Vo , Huy Kang Kim , Jin B. Hong
{"title":"CANival: A multimodal approach to intrusion detection on the vehicle CAN bus","authors":"Hyunjae Kang , Thanh Vo , Huy Kang Kim , Jin B. Hong","doi":"10.1016/j.vehcom.2024.100845","DOIUrl":"10.1016/j.vehcom.2024.100845","url":null,"abstract":"<div><p>Vehicles of today are composed of over 100 electronic embedded devices known as Electronic Control Units (ECU), each of which controls a different component of the vehicle and communicates via the Controller Area Network (CAN) bus. However, unlike other network protocols, the CAN bus communication protocol lacks security features, which is a growing concern as more vehicles become connected to the Internet. To enable the detection of intrusions on the CAN bus, numerous intrusion detection systems (IDS) have been proposed. Although some are able to achieve high accuracy in detecting specific attacks, no IDS has been able to accurately detect all types of attacks against the CAN bus. To overcome the aforementioned issues, we propose a multimodal analysis framework named <span>CANival</span>, which consists of time interval-based and signal-based analyzers developed by designing a novel Time Interval Likelihood (TIL) model and optimizing an existing model CANet. Experimental results show that our multimodal IDS outperforms the base models and enhances the detection performance testing on two recent datasets, X-CANIDS Dataset and SynCAN, achieving average true positive rates of 0.960 and 0.912, and true negative rates of 0.997 and 0.996, respectively.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100845"},"PeriodicalIF":5.8,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001207/pdfft?md5=5a3ea24f061884777e2d92beaac3bc58&pid=1-s2.0-S2214209624001207-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning","authors":"Zhian Chen, Fei Wang, Jiaojie Wang","doi":"10.1016/j.vehcom.2024.100844","DOIUrl":"10.1016/j.vehcom.2024.100844","url":null,"abstract":"<div><p>Due to the high mobility, high chance of line-of-sight (LoS) transmission, and flexible deployment, unmanned aerial vehicles (UAVs) have been used as mobile edge computing (MEC) servers to provide ubiquitous computation services to mobile users (MUs). However, the limited energy storage, caching capacity, and computation resources of UAVs bring new challenges for UAV-aided MEC, e.g., how to recharge UAVs and how to jointly optimize service-caching, computation-offloading, and UAVs flight trajectories. To overcome the above-mentioned difficulties, in this paper we study the joint optimization for service-caching, computation-offloading, and UAVs flight trajectories for UAV-aided MEC, where multiple rechargeable UAVs cooperatively provide MEC services to a number of MUs. First, we formulate an energy minimization problem to minimize all MUs' energy consumptions by taking into account the mobility of MUs and the energy replenishment of UAVs. Then, using the <em>hierarchical multi-agent deep reinforcement learning</em> (<u>HMDRL</u>), we develop a two-timescale based joint <u>s</u>ervice-<u>c</u>aching, <u>c</u>omputation-<u>o</u>ffloading, and UAVs <u>f</u>light <u>t</u>rajectories scheme, called <em>HMDRL-Based SCOFT</em>. Using HMDRL-Based SCOFT, we derive UAVs' service-caching policies in each time frame, and then derive UAVs flight trajectories and MUs' computation-offloading in each time slot. Finally, we validate and evaluate the performances of our proposed HMDRL-Based SCOFT scheme through extensive simulations, which show that our developed scheme outperforms the other baseline schemes to converge faster and greatly reduce MUs' energy consumptions.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100844"},"PeriodicalIF":5.8,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels","authors":"Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya, Mahdi Nangir","doi":"10.1016/j.vehcom.2024.100840","DOIUrl":"10.1016/j.vehcom.2024.100840","url":null,"abstract":"<div><p>In this paper, we consider a multi-tier cellular network in which a hovering Unmanned Aerial Vehicle (UAV) assists the network in the absence of the terrestrial Macrocell base station. The orthogonal sub channels are assumed for communication between the UAV and its attached users. The Femtocell users and Device-to-Device (D2D) pairs transmit their data to the corresponding receivers in the same sub-channels. Achieving the outage probability of the ground users, is a challenge for the operators considering the dominant small scale and large scale fading over the channels, Line-of-Sight and None-Line-of-Sight conditions together. The mentioned problem becomes worse in the presence of cross-tier interferences. We investigate the outage probability of the ground UAV users to evaluate the performance of the network. Due to intractability of the calculations to derive the exact outage probability, the closed-form expressions are derived for the upper bound of outage probability under Rayleigh and Nakagami-<em>m</em> fading. The effect of UAV altitude, density of D2Ds and corresponding transmission powers are discussed. The results verify the simulations and confirm that the proposed approach outperforms the existing upper bound methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100840"},"PeriodicalIF":5.8,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Altynbek Serikov, Mohd Hamza Naim Shaikh, Galymzhan Nauryzbayev
{"title":"Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces","authors":"Altynbek Serikov, Mohd Hamza Naim Shaikh, Galymzhan Nauryzbayev","doi":"10.1016/j.vehcom.2024.100841","DOIUrl":"10.1016/j.vehcom.2024.100841","url":null,"abstract":"<div><p>Physical layer security (PLS) aims to ensure the confidentiality and authenticity of transmitted data by capitalizing on the inherent randomness of wireless channels. Owing to the popularity of intelligent transportation systems (ITSs), PLS research has sparked renewed interest in the wireless research community. This paper investigates the performance of secure communication in the context of a vehicle-to-vehicle (V2V) communication scenario by employing a reconfigurable intelligent surface (RIS). Further, we introduce the concept of non-orthogonal multiple access (NOMA) to reduce latency and improve communication efficiency in V2V networks. This study aims to comprehensively analyze secrecy performance, encompassing parameters like average secrecy capacity (ASC), secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNZSC). Our research aims to highlight the efficacy of RIS in providing secure and reliable communication within V2V NOMA networks. Ultimately, our study contributes to advancing secure communication protocols in intelligent transportation systems.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100841"},"PeriodicalIF":5.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001165/pdfft?md5=f26c6e9ea8dc5acc8055c994ba1cd365&pid=1-s2.0-S2214209624001165-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amir Masoud Rahmani , Dildar Hussain , Reem Jafar Ismail , Faisal Alanazi , Salem Belhaj , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Mehdi Hosseinzadeh
{"title":"An adaptive and multi-path greedy perimeter stateless routing protocol in flying ad hoc networks","authors":"Amir Masoud Rahmani , Dildar Hussain , Reem Jafar Ismail , Faisal Alanazi , Salem Belhaj , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Mehdi Hosseinzadeh","doi":"10.1016/j.vehcom.2024.100838","DOIUrl":"10.1016/j.vehcom.2024.100838","url":null,"abstract":"<div><p>In recent years, flying ad hoc networks (FANET), formed from unmanned aerial vehicles (UAVs), have absorbed the attention of academic and industrial research communities due to their many applications in military and civilian fields. FANETs benefit from unique features, including highly moving UAVs and dynamic topological structure. Therefore, most existing routing protocols, such as the greedy perimeter stateless routing (GPSR), are not compatible with the FANET environment and its specific features. To improve the performance of GPSR in FANET, it is important to address several challenges, namely the selection of the right period for broadcasting hello messages in the network, the selection of the right criteria for selecting the next-hop node, and the improvement of reliability in the data transfer process. In this paper, an adaptive and multi-path greedy perimeter stateless routing (AM-GPSR) protocol is suggested in FANETs. It includes two new strategies, namely adaptive hello strategy and multi-path greedy forwarding strategy. The adaptive hello strategy defines a special hello broadcast period for each UAV according to its speed and error between two estimated and actual positions. Furthermore, the greedy forwarding strategy carries out a filtering operation on candidate nodes and eliminates border UAVs and those that are far from the destination. Then, candidate UAVs are prioritized based on the time to reach the destination and buffer capacity, and UAVs with higher priorities are chosen to send data packets. Finally, AM-GPSR applies a greedy multi-path forwarding strategy to increase reliability in the data transmission process. Lastly, the simulation of AM-GPSR is done via the network simulator version 2 (NS2) to evaluate its performance. This evaluation process includes two different scenarios, i.e. change in the speed of UAVs and change in their communication range. In this process, AM-GPSR is compared with three other methods, namely the aerial greedy geographic routing (AGGR) protocol, the geolocation assisted aeronautical routing protocol (AeroRP), and GPSR. This comparison shows the successful performance of AM-GPSR in terms of delivery success rate, throughput, and delay. Although the control overhead of the proposed method is more than that of AGGR.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100838"},"PeriodicalIF":5.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach","authors":"Dongmei Zhao , Pengcheng Shen , Xunzhen Han , Shuiguang Zeng","doi":"10.1016/j.vehcom.2024.100842","DOIUrl":"10.1016/j.vehcom.2024.100842","url":null,"abstract":"<div><p>With the rapid development and extensive application of unmanned aerial vehicles (UAVs), the issue of UAV swarm network security has become prominent. To protect the security of UAV swarm networks, effective network security defense measures are crucial. One key aspect is the assessment and monitoring of the network's security situation. However, most existing research focuses on the security of individual UAVs or detecting specific attacks, which fails to provide proactive protection for the network. To address this issue, we propose a UAV swarm network security situation assessment method, which combines the Transformer network with the optimization of the Aggregated Residual Transformations for Deep Neural Networks (ResNeXt) and squeeze-and-excitation (SE) structure (named TransReSE). By using multiple scale-cross convolution kernels, TransReSE can efficiently extract data features and improve situation assessment accuracy through the Transformer network. Experimental results from four public datasets have shown that TransReSE outperforms other schemes in terms of accuracy, recall, and F1. By assessing the value of the swarm network situation and the threat level, we can make faster, more effective decisions and proactively allocate resources to defend against UAV swarm network attacks.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100842"},"PeriodicalIF":5.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheng-wei Xu , Shu-han Yu , Yi-Jie Bai , Zi-Yan Yue , Yi-Long Liu
{"title":"LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET","authors":"Sheng-wei Xu , Shu-han Yu , Yi-Jie Bai , Zi-Yan Yue , Yi-Long Liu","doi":"10.1016/j.vehcom.2024.100843","DOIUrl":"10.1016/j.vehcom.2024.100843","url":null,"abstract":"<div><p>The rapid development of vehicular ad-hoc networks (VANETs) has brought great convenience to intelligent transportation, and the secure transmission of information in VANETs has become a serious problem. In addition, the protection of private information of vehicles is also a key issue. Aiming at the problem of how to guarantee the secure transmission of information in VANETs under the condition of satisfying security and privacy, we propose a lattice-based conditional privacy-preserving certificateless aggregate signature scheme (LB-CLAS) for VANETs. Instead of using Number Theory Research Unit (NTRU) lattices and discrete Gaussian sampling, the proposed LB-CLAS scheme is based on algebraic lattice. In addition, based on the module version of Small Integer Solution (MSIS) and module version of Learning With Error (MLWE) hard problems, we prove that the LB-CLAS scheme is existential unforgeability under adaptively chosen message attacks (EUF-CMA). Our LB-CLAS scheme employs individual signature verification in vehicle-to-vehicle (V2V) mode, while utilizing aggregate signatures and batch verification in vehicle-to-infrastructure (V2I) mode, with slightly differing transmission parameters between the two modes. Based on Dilithium, our LB-CLAS scheme solves the problem of high storage overhead and computational cost of existing schemes. The performance analysis shows that our LB-CLAS scheme is more efficient in terms of computation cost, storage overhead, and power consumption compared to existing schemes. Compared with existing schemes, our LB-CLAS scheme reduces the signature and verification overheads by more than 17.6% and 43.4%, respectively. Our LB-CLAS program also has significant advantages in batch verification. As the number of vehicles increases, our batch certification time cost is reduced by more than 90%. In addition, our LB-CLAS scheme has the smallest signature length, with a signature size that is 1X smaller than the most efficient existing scheme for the same level of security.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100843"},"PeriodicalIF":5.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001189/pdfft?md5=d16493d6df4ea967cee7aafc78f227fc&pid=1-s2.0-S2214209624001189-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong Min , Jawad Tanveer , Amir Masoud Rahmani , Abdullah Alqahtani , Abed Alanazi , Shtwai Alsubai , Mehdi Hosseinzadeh
{"title":"URLLC-aware and energy-efficient data offloading strategy in high-mobility vehicular mobile edge computing environments","authors":"Hong Min , Jawad Tanveer , Amir Masoud Rahmani , Abdullah Alqahtani , Abed Alanazi , Shtwai Alsubai , Mehdi Hosseinzadeh","doi":"10.1016/j.vehcom.2024.100839","DOIUrl":"10.1016/j.vehcom.2024.100839","url":null,"abstract":"<div><p>The integration of Internet of Things (IoT) technologies into the vehicular industry has initiated a new era of connected and autonomous vehicles, revolutionizing transportation systems. However, this transformation introduces significant challenges, especially in 5 G networks, such as achieving Ultra-Reliable Low-Latency Communications (URLLC) and maintaining energy efficiency within the high mobility of vehicular environments. These are essential for supporting sustainable and environmentally friendly computing practices. To address these challenges, this paper introduces a URLLC-aware and energy-efficient data offloading strategy, utilizing the Asynchronous Advantage Actor-Critic (A3C) algorithm to navigate the complex dynamics of vehicular Mobile Edge Computing (MEC) environments. Our proposed method balances latency and energy consumption trade-offs while ensuring robust communication reliability. Technical evaluations reveal that our approach significantly outperforms other algorithms, achieving up to 8.2 % energy savings and a reduction of over 29 % in latency.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100839"},"PeriodicalIF":5.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142167873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning","authors":"Muzun Althunayyan , Amir Javed , Omer Rana","doi":"10.1016/j.vehcom.2024.100837","DOIUrl":"10.1016/j.vehcom.2024.100837","url":null,"abstract":"<div><p>As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus has become the predominant communication standard for in-vehicle networks due to its speed and efficiency. However, the CAN bus lacks basic security measures such as authentication and encryption, making it highly vulnerable to cyberattacks. To ensure in-vehicle security, intrusion detection systems (IDSs) must detect seen attacks and provide a robust defense against new, unseen attacks while remaining lightweight for practical deployment. Previous work has relied solely on the CAN ID feature or has used traditional machine learning (ML) approaches with manual feature extraction. These approaches overlook other exploitable features, making it challenging to adapt to new unseen attack variants and compromising security. This paper introduces a cutting-edge, novel, lightweight, in-vehicle, IDS-leveraging, deep learning (DL) algorithm to address these limitations. The proposed IDS employs a multi-stage approach: an artificial neural network (ANN) in the first stage to detect seen attacks, and a Long Short-Term Memory (LSTM) autoencoder in the second stage to detect new, unseen attacks. To understand and analyze diverse driving behaviors, update the model with the latest attack patterns, and preserve data privacy, we propose a theoretical framework to deploy our IDS in a hierarchical federated learning (H-FL) environment. Experimental results demonstrate that our IDS achieves an F1-score exceeding 0.99 for seen attacks and exceeding 0.95 for novel attacks, with a detection rate of 99.99%. Additionally, the false alarm rate (FAR) is exceptionally low at 0.016%, minimizing false alarms. Despite using DL algorithms known for their effectiveness in identifying sophisticated and zero-day attacks, the IDS remains lightweight, ensuring its feasibility for real-world deployment. This makes our model robust against seen and unseen attacks.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100837"},"PeriodicalIF":5.8,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001128/pdfft?md5=5c13cb7ede7ac0fd94530908e6c0a393&pid=1-s2.0-S2214209624001128-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure authentication framework for IoV based on blockchain and ensemble learning","authors":"Wenxian Jiang , Xianglong Lv , Jun Tao","doi":"10.1016/j.vehcom.2024.100836","DOIUrl":"10.1016/j.vehcom.2024.100836","url":null,"abstract":"<div><p>A secure authentication framework based on blockchain and ensemble learning is proposed to address the problem that vehicle identity privacy data in Internet of Vehicles (IoV) is vulnerable to theft and tampering. First, a secure and efficient authentication method based on blockchain and Physical Unclonable Function (PUF) is implemented, which ensures the identity privacy of the vehicle when accessing IoV, and improves the problem of high resource overhead of the traditional IoV authentication scheme while guaranteeing security, and the computational overhead is about 2.424 ms at the first level of security framework. Secondly, an intrusion detection method based on Whale Optimization Algorithm (WOA) and Extreme Gradient Boosting (XGBoost) is proposed, and the detection model trained based on this method can effectively detect various attacks against IoV. As a security method at the second level of secure framework, the method outperforms related works in detecting malicious attacks with a detection accuracy of 98.41% for ToN-IoT and 99.99% for BoT-IoT.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100836"},"PeriodicalIF":5.8,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142128414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}