Dual Detection Procedure to Secure Flying Ad Hoc Networks: A Trust-Based Framework
暂无分享,去创建一个
[1] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[2] Ilker Bekmezci,et al. Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.
[3] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[4] Riham Altawy,et al. Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..
[5] Victor A. Skormin,et al. Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).
[6] Anil Kumar Verma,et al. Flying Adhoc Networks Concept and Challenges , 2018 .
[7] John A. Stankovic,et al. Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare , 2016, ACM Trans. Cyber Phys. Syst..
[8] Qingqing Wu,et al. Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[9] Shahryar Sarkani,et al. Unmanned aerial vehicle smart device ground control station cyber security threat model , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[10] Yang Xiang,et al. A novel organizing scheme of single topic user group based on trust chain model in social network , 2018, Int. J. Commun. Syst..
[11] Inseok Hwang,et al. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.
[12] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[13] Victor Skormin,et al. Unmanned Aerial Vehicle security using behavioral profiling , 2015, 2015 International Conference on Unmanned Aircraft Systems (ICUAS).
[14] Hichem Snoussi,et al. FANET: Communication, mobility models and security issues , 2019, Comput. Networks.
[15] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[16] Ilsun You,et al. Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives , 2018, Research Briefs on Information and Communication Technology Evolution.
[17] Jean-Philippe Condomines,et al. Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation , 2019, Ad Hoc Networks.
[18] Kuldeep Singh,et al. A fuzzy-based trust model for flying ad hoc networks (FANETs) , 2018, Int. J. Commun. Syst..