Modeling the Spreading Patterns of Malicious Information in a Platoon with Connected Vehicles