暂无分享,去创建一个
Frank Kargl | Thomas Lukaseder | Rens Wouter van der Heijden | F. Kargl | R. W. V. D. Heijden | Thomas Lukaseder | R. V. D. Heijden
[1] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[2] Thomas Engel,et al. Ieee Intelligent Transportation Systems Magazine @bullet 52 @bullet Summer 2017 Luxembourg Sumo Traffic (lust) Scenario: Traffic Demand Evaluation , 2022 .
[3] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[4] Frank Kargl,et al. Enhanced Position Verification for VANETs Using Subjective Logic , 2016, VTC 2016.
[5] Tim Leinmüller,et al. Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.
[6] Falko Dressler,et al. Toward reproducibility and comparability of IVC simulation studies: a literature survey , 2012, IEEE Communications Magazine.
[7] Nai-Wei Lo,et al. Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.
[8] Abdulmotaleb El-Saddik,et al. How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey , 2015, ACM Comput. Surv..
[9] Takaya Saito,et al. The Precision-Recall Plot Is More Informative than the ROC Plot When Evaluating Binary Classifiers on Imbalanced Datasets , 2015, PloS one.
[10] Sorin A. Huss,et al. A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition , 2011, 2011 IEEE Vehicular Networking Conference (VNC).
[11] Hendrik Decke,et al. A flexible, subjective logic-based framework for misbehavior detection in V2V networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[12] M. Kemp,et al. Oral, Nasal and Pharyngeal Exposure to Lipopolysaccharide Causes a Fetal Inflammatory Response in Sheep , 2015, PloS one.
[13] Tim Leinmüller,et al. Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems , 2016, IEEE Communications Surveys & Tutorials.
[14] Tim Leinmüller,et al. Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .
[15] William Whyte,et al. Binary hash tree based certificate access management for connected vehicles , 2017, WISEC.
[16] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[17] Ivan Martinovic,et al. Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics , 2017, AsiaCCS.
[18] John S. Baras,et al. A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[19] Frank Kargl,et al. Analyzing attacks on cooperative adaptive cruise control (CACC) , 2017, 2017 IEEE Vehicular Networking Conference (VNC).
[20] Andrea C. Arpaci-Dusseau,et al. The Popper Convention: Making Reproducible Systems Evaluation Practical , 2017, 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
[21] Reinhard German,et al. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.