Towards a secure automatic identification system (AIS)
暂无分享,去创建一个
Sokratis K. Katsikas | Athanassios Goudossis | S. Katsikas | Athanassios Goudossis | Athanassios-Athanasios Goudossis-Goudosis
[1] Fabio Mazzarella,et al. Knowledge-based vessel position prediction using historical AIS data , 2015, 2015 Sensor Data Fusion: Trends, Solutions, Applications (SDF).
[2] Henry L. Owen,et al. IEEE 1609 Influenced Automatic Identification System (AIS) , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[3] Fabrizio Natale,et al. Mapping EU fishing activities using ship tracking data , 2016, ArXiv.
[4] Michael Jürgen Werner. IX. Directive 2002/59/EC establishing a Community vessel traffic monitoring and information system and repealing Council Directive 93/75/EEC , 2016 .
[5] Marco Balduzzi,et al. A Security Evaluation of AIS , 2014 .
[6] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[7] Matthias Gerlach,et al. Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[8] Hwasoo Yeo,et al. How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption , 2017, IEEE Transactions on Intelligent Transportation Systems.
[9] Ding-Zhu Du,et al. Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..
[10] Floris Goerlandt,et al. An Advanced Method For Detecting Possible Near Miss Ship Collisions From AIS Data , 2016 .
[11] Michele Vespe,et al. Vessel Pattern Knowledge Discovery from AIS Data: A Framework for Anomaly Detection and Route Prediction , 2013, Entropy.
[12] Asadullah Shah,et al. Anomaly Detection in Vessel Tracking Using Support Vector Machines (SVMs) , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.
[13] Fabio Mazzarella,et al. Discovering vessel activities at sea using AIS data: Mapping of fishing footprints , 2014, 17th International Conference on Information Fusion (FUSION).
[14] Yuguang Fang,et al. Securing resource-constrained wireless ad hoc networks , 2007, 2007 IEEE Sarnoff Symposium.
[15] Nathan D. Merchant,et al. Assessing sound exposure from shipping in coastal waters using a single hydrophone and Automatic Identification System (AIS) data. , 2012, Marine Pollution Bulletin.
[16] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[17] Rajinder Singh. Wireless Network Security , 2012 .
[18] Feng Lu,et al. A quantitative approach for delineating principal fairways of ship passages through a strait , 2015 .
[19] Sudip Misra,et al. Security in Vehicular Ad Hoc Networks , 2016 .
[20] Andrew Palmer,et al. The New Pirates: Modern Global Piracy from Somalia to the South China Sea , 2014 .
[21] Kim-Kwang Raymond Choo,et al. Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System , 2017, IEEE Transactions on Information Forensics and Security.
[22] Ivan Martinovic,et al. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.
[23] Mark R. Morelande,et al. Statistical analysis of motion patterns in AIS Data: Anomaly detection and motion prediction , 2008, 2008 11th International Conference on Information Fusion.
[24] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[25] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[26] Richard A. Frost,et al. A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.
[27] Dae-Hee Seo,et al. S3 (Secure Ship-to-Ship) Information Sharing Scheme using Ship Authentication in the e-Navigation , 2015 .
[28] Göran Falkman,et al. Anomaly detection in sea traffic - A comparison of the Gaussian Mixture Model and the Kernel Density Estimator , 2009, 2009 12th International Conference on Information Fusion.
[29] Paolo Braca,et al. Context-enhanced vessel prediction based on Ornstein-Uhlenbeck processes using historical AIS traffic patterns: Real-world experimental results , 2014, 17th International Conference on Information Fusion (FUSION).
[30] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[31] Van Wimersma Greidanus Herman,et al. Data Fusion for Wide-Area Maritime Surveillance , 2013 .
[32] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[33] Floris Goerlandt,et al. An analysis of wintertime navigational accidents in the Northern Baltic Sea , 2017 .
[34] Joonsang Baek,et al. A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification , 2017, IEEE Transactions on Services Computing.
[35] H. Ligteringen,et al. Comparison study on AIS data of ship traffic behavior , 2015 .
[36] J. Kukkonen,et al. A Comprehensive Inventory of the Ship Traffic Exhaust Emissions in the Baltic Sea from 2006 to 2009 , 2013, AMBIO.
[37] Jason R. W. Merrick,et al. On a risk management analysis of oil spill risk using maritime transportation system simulation , 2011, Ann. Oper. Res..
[38] Richard L. Shelmerdine,et al. Teasing out the detail: How our understanding of marine AIS data can better inform industries, developments, and planning , 2015 .
[39] Ali Miri,et al. Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.
[40] Hua-Yi Lin,et al. Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks , 2005, IEICE Trans. Commun..
[41] Johannes Spaethe,et al. Functional Significance of Labellum Pattern Variation in a Sexually Deceptive Orchid (Ophrys heldreichii): Evidence of Individual Signature Learning Effects , 2015, PloS one.
[42] Mark McIntyre,et al. Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems , 2007, IFIPTM.
[43] Fabrizio Natale,et al. Mapping Fishing Effort through AIS Data , 2015, PloS one.
[44] Li Suyi,et al. Ship collision risk assessment for the Singapore Strait. , 2011, Accident; analysis and prevention.
[45] Jianjun Zhu,et al. AIS Database Powered by GIS Technology for Maritime Safety and Security , 2008, Journal of Navigation.
[46] Panagiotis Papadimitratos,et al. VeSPA: vehicular security and privacy-preserving architecture , 2013, HotWiSec '13.