Loading… Taking too long? Reload document | Open in new tab previousDECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and BlockchainnextA Recommendation Model for Security Risk Management in Car-Sharing Scenarios