False-Alarm Detection in the Fog-Based Internet of Connected Vehicles
暂无分享,去创建一个
Mohsen Guizani | M. Shamim Hossain | Awny Alnusair | Mohammed F. Alhamid | Samer Samarah | Majdi Rawashdeh | Mohammed GH. Al Zamil | Samer M. J. Samarah | M. Guizani | M. S. Hossain | M. A. Al Zamil | Awny Alnusair | Majdi Rawashdeh | M. Alhamid
[1] M. Shamim Hossain,et al. HELOS: Heterogeneous Load Scheduling for Electric Vehicle-Integrated Microgrids , 2017, IEEE Transactions on Vehicular Technology.
[2] M. Shamim Hossain,et al. Transferring activity recognition models in FOG computing architecture , 2018, J. Parallel Distributed Comput..
[3] Sok-Ian Sou,et al. Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks , 2017, IEEE Transactions on Vehicular Technology.
[4] Yu Wang. Review of vehicular networks, from theory to practice, edited by Stephan Olariu and Michele C. Weigle , 2012, SIGA.
[5] Seema Bawa,et al. A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..
[6] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[7] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[8] T.Y. Lin,et al. Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.
[9] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[10] M. Shamim Hossain,et al. Cloud-assisted secure video transmission and sharing framework for smart cities , 2017, Future Gener. Comput. Syst..
[11] Liang Zhou,et al. Cooperation advances on vehicular communications: A survey , 2014, Veh. Commun..
[12] Yi-Ming Chen,et al. An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[13] M. Shamim Hossain,et al. A knowledge-driven approach for activity recognition in smart homes based on activity profiling , 2020, Future Gener. Comput. Syst..
[14] Yu-Dong Yao,et al. Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users , 2018, IEEE Transactions on Vehicular Technology.
[15] Abdulsalam Yassine,et al. Autonomous monitoring in healthcare environment: Reward-based energy charging mechanism for IoMT wireless sensing nodes , 2019, Future Gener. Comput. Syst..
[16] M. Shamim Hossain,et al. An Annotation Technique for In-Home Smart Monitoring Environments , 2018, IEEE Access.
[17] M. Shamim Hossain,et al. Emotion recognition using deep learning approach from audio-visual emotional big data , 2019, Inf. Fusion.
[18] David B. Skillicorn,et al. A Distributed Approach for Prediction in Sensor Networks , 2005 .
[19] M. Anwar Hossain,et al. An ODT-based abstraction for mining closed sequential temporal patterns in IoT-cloud smart homes , 2017, Cluster Computing.
[20] Mohammed G. H. al Zamil,et al. Dynamic event classification for intrusion and false alarm detection in vehicular ad hoc networks , 2016, Int. J. Inf. Commun. Technol..
[21] Bob Familiar,et al. Real-Time Processing Using Azure Stream Analytics , 2017 .
[22] Mohammed G. H. al Zamil,et al. Dynamic rough-based clustering for vehicular ad-hoc networks , 2015, Int. J. Inf. Decis. Sci..
[23] Yi-Ming Chen,et al. Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs , 2012, WISA.
[24] M. Shamim Hossain,et al. Localization Based on Social Big Data Analysis in the Vehicular Networks , 2017, IEEE Transactions on Industrial Informatics.
[25] Samer Samarah,et al. Model Checking Based Classification Technique for Wireless Sensor Networks , 2012 .
[26] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[27] Gerhard P. Hancke,et al. A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study , 2018, Sensors.
[28] M. Shamim Hossain,et al. Secure Enforcement in Cognitive Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[29] M. Shamim Hossain,et al. Reliable service delivery in Tele-health care systems , 2018, J. Netw. Comput. Appl..
[30] Janelle J. Harms,et al. Distributed classification of acoustic targets in wireless audio-sensor networks , 2008, Comput. Networks.
[31] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[32] Dharma P. Agrawal,et al. Intrusion detection in Gaussian distributed Wireless Sensor Networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.