Misbehavior Detection in C-ITS Using Deep Learning Approach
暂无分享,去创建一个
[1] Sorin A. Huss,et al. A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition , 2011, 2011 IEEE Vehicular Networking Conference (VNC).
[2] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[3] Jalel Ben-Othman,et al. Detection of Radio Interference Attacks in VANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[4] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[5] Gongjun Yan,et al. Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.
[6] Vijay Laxmi,et al. Misbehavior Detection Based on Ensemble Learning in VANET , 2011, ADCONS.
[7] Duo Liu,et al. Removal of misbehaving insiders in anonymous VANETs , 2009, MSWiM '09.
[8] Arobinda Gupta,et al. Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.
[9] Maxim Raya,et al. Optimal revocations in ephemeral networks: A game-theoretic framework , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[10] Shikha Agrawal,et al. A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks , 2015 .
[11] Tim Leinmüller,et al. Cooperative Position Verification - Defending Against Roadside Attackers 2.0 , 2010 .
[12] Kurt Hornik,et al. Approximation capabilities of multilayer feedforward networks , 1991, Neural Networks.
[13] Sorin A. Huss,et al. Verifying Mobility Data under Privacy Considerations in Car-to-X Communication , 2010 .
[14] William Whyte,et al. A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.
[15] Vijay Laxmi,et al. Machine Learning Approach for Multiple Misbehavior Detection in VANET , 2011, ACC.
[16] Daniel Krajzewicz,et al. SUMO - Simulation of Urban MObility An Overview , 2011 .
[17] Arobinda Gupta,et al. Application of Secondary Information for Misbehavior Detection in VANETs , 2010, Networking.
[18] Adrian Perrig,et al. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[19] Elaine Shi,et al. Efficient and secure threshold-based event validation for VANETs , 2011, WiSec '11.
[20] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.