Application level attacks on Connected Vehicle Protocols
暂无分享,去创建一个
Nael B. Abu-Ghazaleh | Qi Zhu | Zhiyun Qian | Matthew Barth | Sakib Md. Bin Malek | Ahmed Abdo | M. Barth | Zhiyun Qian | N. Abu-Ghazaleh | Qi Zhu | A. Abdo | S. Malek | Ahmed Abdo
[1] Wei Huang,et al. Automatic multi-vehicle tracking using video cameras: An improved CAMShift approach , 2013 .
[2] Ryan M. Eustice,et al. Risk Assessment for Cooperative Automated Driving , 2016, CPS-SPC '16.
[3] Hui Deng,et al. Platoon management with cooperative adaptive cruise control enabled by VANET , 2015, Veh. Commun..
[4] Reinhard German,et al. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.
[5] Frank Perry,et al. Dedicated Short Range Communications Roadside Unit Specifications , 2017 .
[6] Mike Lukuc,et al. Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .
[7] M M Minderhoud,et al. Extended time-to-collision measures for road traffic safety assessment. , 2001, Accident; analysis and prevention.
[8] Tang-Hsien Chang,et al. Traffic Monitoring and Vehicle Tracking using Roadside Cameras , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[9] Dipak Ghosal,et al. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.
[10] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[11] M. Barth,et al. Intelligent Transportation Systems and Greenhouse Gas Reductions , 2015, Current Sustainable/Renewable Energy Reports.
[12] Yiheng Feng,et al. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.