Analyzing the impact of false-accident cyber attacks on traffic flow stability in connected vehicle environment
暂无分享,去创建一个
Guohui Zhang | Amit Singh | Xiaowen Jiang | Peter J. Jin | C. Michael Walton | C. Walton | Guohui Zhang | P. Jin | Xiaowen Jiang | Amit Singh
[1] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[2] Amer Aijaz,et al. Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .
[3] LuRongxing,et al. Complementing public key infrastructure to secure vehicular ad hoc networks , 2010 .
[4] Bin Ran,et al. Bidirectional Control Characteristics of General Motors and Optimal Velocity Car-Following Models , 2013 .
[5] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[6] E. Montroll,et al. Traffic Dynamics: Studies in Car Following , 1958 .
[7] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[8] Chang-Jen Lan,et al. Estimation of Incident Delay and Its Uncertainty on Freeway Networks , 2006 .
[9] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[10] K. Hasebe,et al. Analysis of optimal velocity model with explicit delay , 1998, patt-sol/9805002.
[11] Frank Kargl,et al. Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.
[12] Xiaodong Lin,et al. Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[13] Helbing,et al. Congested traffic states in empirical observations and microscopic simulations , 2000, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[14] Bin Ran,et al. Reducing the Error Accumulation in Car-Following Models Calibrated With Vehicle Trajectory Data , 2014, IEEE Transactions on Intelligent Transportation Systems.
[15] Jitendra Bhatia,et al. REVIEW ON VARIOUS SECURITY THREATS & SOLUTIONS AND NETWORK CODING BASED SECURITY APPROACH FOR VANET , 2013 .
[16] R. E. Wilson,et al. Car-following models: fifty years of linear stability analysis – a mathematical perspective , 2011 .
[17] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[18] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[19] Nitin H. Vaidya,et al. A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[20] Nakayama,et al. Dynamical model of traffic congestion and numerical simulation. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[21] Rahim F Benekohal,et al. Comparison of Car-Following Models for Simulation , 1999 .
[22] Mohamed,et al. A Survey on VANET Intrusion Detection Systems , 2013 .
[23] Steven H Bayless. Fourth Generation Wireless - Vehicle and Highway Gateways to the Cloud: An evaluation of Long Term Evolution (LTE) and other wireless technologies’ impact to the transportation sector , 2011 .