A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology
暂无分享,去创建一个
Maode Ma | Alan Kai-Hau Yeung | Junwei Liang | Muhammad Sadiq | M. Ma | A. Yeung | M. Sadiq | Junwei Liang
[1] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[2] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[3] Jeff A. Bilmes,et al. A gentle tutorial of the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models , 1998 .
[4] Sandeep Kumar,et al. Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Véronique Berge-Cherfaoui,et al. Detecting Road Events Using Distributed Data Fusion: Experimental Evaluation for the Icy Roads Case , 2016, IEEE Transactions on Intelligent Transportation Systems.
[6] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[7] Andreas Rauber,et al. The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data , 2002, IEEE Trans. Neural Networks.
[8] Ivan Stojmenovic,et al. Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.
[9] Jalel Ben-Othman,et al. DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.
[10] Sushanta Karmakar,et al. A game theory based multi layered intrusion detection framework for VANET , 2018, Future Gener. Comput. Syst..
[11] Jamal Bentahar,et al. CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks , 2016, Expert Syst. Appl..
[12] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[13] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[14] Sami Muhaidat,et al. Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[15] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[16] Yuguang Fang,et al. A defense technique against misbehavior in VANETs based on threshold authentication , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[17] Nirwan Ansari,et al. Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.
[18] Ajay Kaul,et al. Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..
[19] Samuel Pierre,et al. Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithm , 2016, IEEE Transactions on Intelligent Transportation Systems.
[20] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[21] Qin Li,et al. A Reputation-Based Announcement Scheme for VANETs , 2012, IEEE Transactions on Vehicular Technology.
[22] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[23] Sidi-Mohammed Senouci,et al. An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.
[24] Ahmad Khademzadeh,et al. VWCA: An efficient clustering algorithm in vehicular ad hoc networks , 2011, J. Netw. Comput. Appl..
[25] Jie Liu,et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[26] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[27] Klaus D. McDonald-Maier,et al. On the detection of grey hole and rushing attacks in self-driving vehicular networks , 2015, 2015 7th Computer Science and Electronic Engineering Conference (CEEC).
[28] Dijiang Huang,et al. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.
[29] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[30] Zhong Ming,et al. An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..
[31] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.