Accessing risk priority of SSL SYN attack using game theoretic attack defense tree model for VANETs
暂无分享,去创建一个
[1] Gagangeet Singh Aujla,et al. A Noble Routing Protocol for Vehicular ad hoc Networks (VANETs) with Less Routing Overheads , 2014 .
[2] Samanpreet Singh. A closer look through routing protocols in vehicular ad hoc networks (VANETs) , 2014 .
[3] Ji Yi,et al. A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment , 2008, 2008 International Conference on Computer Science and Software Engineering.
[4] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[5] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[6] Seema Bawa,et al. A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..
[7] Jun Luo,et al. An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[8] Joel J. P. C. Rodrigues,et al. Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination , 2015, Mob. Networks Appl..
[9] Haojin Zhu,et al. A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs , 2011, 2011 IEEE International Conference on Communications (ICC).
[10] Xiaolong Li,et al. An attack-and-defence game for security assessment in vehicular ad hoc networks , 2014, Peer Peer Netw. Appl..
[11] Wei Jiang,et al. Optimal Network Security Strengthening Using Attack-Defense Game Model , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[12] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[13] Seema Bawa,et al. QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks , 2015, Mob. Networks Appl..
[14] Jun Li,et al. A network security assessment model based on attack-defense game theory , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[15] Indrajit Ray,et al. Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.
[16] Ying Hong,et al. Study on physical layer security with game theory , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.
[17] Subhas C. Misra,et al. An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..
[18] Michael Wooldridge,et al. Does Game Theory Work? , 2012, IEEE Intelligent Systems.
[19] Neeraj Kumar,et al. Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV) environment , 2015, Digit. Commun. Networks.
[20] Sahil Garg,et al. An Attack Tree Based Comprehensive Framework for the Risk and Security Assessment of VANET using the Concepts of Game Theory and Fuzzy Logic , 2014 .
[21] Sandeep Singh Kang,et al. Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs , 2013 .
[22] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.