AI-Based Malicious Network Traffic Detection in VANETs
暂无分享,去创建一个
Alexey V. Vinel | Nikita Lyamin | Denis Kleyko | Quentin Delooz | A. Vinel | D. Kleyko | Nikita Lyamin | Quentin Delooz
[1] Qiang Ni,et al. Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.
[2] Xiaodong Wang,et al. Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks , 2008, IEEE Transactions on Information Forensics and Security.
[3] Mohsen Guizani,et al. Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.
[4] Fredrik Tufvesson,et al. On multilink shadowing effects in measured V2V channels on highway , 2015, 2015 9th European Conference on Antennas and Propagation (EuCAP).
[5] Rong Yu,et al. Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.
[6] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[7] Pierluigi Pisu,et al. Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.
[8] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[9] Xianbin Wang,et al. A Fast Collision Detection Algorithm in IEEE 802.11 through Physical Layer SINR Monitoring , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).
[10] Klaus Wehrle,et al. Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[11] Jonathan Loo,et al. Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks , 2014, IEEE Communications Letters.
[12] Abderrahim Benslimane,et al. Jamming Attack Model and Detection Method for Beacons Under Multichannel Operation in Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.
[13] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[14] Jalel Ben-Othman,et al. DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.
[15] Alexey V. Vinel,et al. Vehicle-to-vehicle communication in C-ACC/platooning scenarios , 2015, IEEE Communications Magazine.
[16] James Gross,et al. Experimental Characterization and Modeling of RF Jamming Attacks on VANETs , 2015, IEEE Transactions on Vehicular Technology.
[17] Hong Liu,et al. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.
[18] Peter Andres,et al. Cooperative Intelligent Transport Systems in Europe: Current Deployment Status and Outlook , 2017, IEEE Vehicular Technology Magazine.