Defensing the malicious attacks of vehicular network in runtime verification perspective | IEEE Conference Publication | IEEE Xplore