Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks
暂无分享,去创建一个
Shalini Batra | Sahil Garg | Neeraj Kumar | Gagangeet Singh Aujla | Neeraj Kumar | S. Garg | Shalini Batra | G. Aujla
[1] Priyadarsi Nanda,et al. Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions] , 2017, IEEE Consumer Electronics Magazine.
[2] Joel J. P. C. Rodrigues,et al. SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.
[3] Mohsen Guizani,et al. Drone-Assisted Public Safety Networks: The Security Aspect , 2017, IEEE Communications Magazine.
[4] Sahil Garg,et al. Accessing risk priority of SSL SYN attack using game theoretic attack defense tree model for VANETs , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[5] Ilker Bekmezci,et al. Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.
[6] Kim-Kwang Raymond Choo,et al. Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System , 2017, IEEE Transactions on Information Forensics and Security.
[7] Ilker Bekmezci,et al. SECURITY ISSUES IN FLYING AD-HOC NETWORKS (FANETs) , 2016 .
[8] Zhenyu Guo,et al. Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.
[9] Kai Hong,et al. Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities , 2014, IEEE Transactions on Vehicular Technology.
[10] JooSeok Song,et al. Novel defense mechanism against data flooding attacks in wireless ad hoc networks , 2010, IEEE Transactions on Consumer Electronics.
[11] Saraju P. Mohanty,et al. Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment , 2017, IEEE Consumer Electronics Magazine.
[12] Bo Wan,et al. An improved cost-based method of Risk Priority Number , 2012, Proceedings of the IEEE 2012 Prognostics and System Health Management Conference (PHM-2012 Beijing).
[13] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[14] Deepak Puthal,et al. Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks , 2017, IEEE Consumer Electronics Magazine.