An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars
暂无分享,去创建一个
Khattab M. Ali Alheeti | Klaus D. McDonald-Maier | Anna Gruebler | K. Mcdonald-Maier | K. Alheeti | A. Gruebler
[1] Venus W. Samawi,et al. The affect of fuzzification on neural networks intrusion detection system , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.
[2] Gongjun Yan,et al. Providing VANET security through active position detection , 2008, Comput. Commun..
[3] Ramanpreet Kaur,et al. BLACKHOLE DETECTION IN MANETS USING ARTIFICIAL NEURAL NETWORKS , 2014 .
[4] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[5] Khattab M. Ali Alheeti,et al. An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[6] Gayathri Chandrasekaran,et al. VANETs : The Networking Platform for Future Vechicular Applications , 2008 .
[7] J.Ramkumar,et al. Fuzzy Logic Approach for Detecting Black HoleAttack in Hybrid Wireless Mesh Network , 2014 .
[8] Ionut Alexandru Budisteanu,et al. Using Artificial Intelligence to create a low cost self-driving car , 2013 .
[9] Amit Parmar. Implementing Current Traffic Signal ControlScenario in VANET Using Sumo , 2015 .
[10] J. Ramkumar,et al. Fuzzy Logic Approach for Detecting Black Hole Attack in Hybrid Wireless Mesh Network , 2015 .
[11] Edward W. Knightly,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[12] P. Sivaranjanadevi,et al. An Effective Intrusion System for Mobile Ad Hoc Networks using Rough Set Theory and Support Vector Machine , 2012, CloudCom 2012.
[13] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[14] Peyman Kabiri,et al. Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2011, Int. J. Netw. Secur..
[15] M. Singh,et al. Detection of Malicious Node in Wireless Sensor Network Based on Data Mining , 2012, 2012 International Conference on Computing Sciences.
[16] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[17] Andrew Harrison,et al. A feature selection method for classification within functional genomics experiments based on the proportional overlapping score , 2014, BMC Bioinformatics.
[18] Sidi-Mohammed Senouci,et al. Expérimentations des communications inter-véhicules , 2008 .
[19] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[20] Ghassan Samara,et al. Security issues and challenges of Vehicular Ad Hoc Networks (VANET) , 2010, 4th International Conference on New Trends in Information Science and Service Science.
[21] V. Lakshmi Praba,et al. Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol , 2013 .