Securing CACC: Strategies for Mitigating Data Injection Attacks | IEEE Conference Publication | IEEE Xplore