A probabilistic model to corroborate three attacks in vehicular ad hoc networks
暂无分享,去创建一个
[1] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[2] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[3] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[4] Ana I. González-Tablas,et al. Overview of security issues in Vehicular Ad-hoc Networks , 2011 .
[5] Levent Ertaul,et al. The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations , 2009, ICWN.
[6] Olivier Heen,et al. A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks , 2009, 2009 IEEE Vehicular Networking Conference (VNC).
[7] Azim Eskandarian,et al. The threat of intelligent collisions , 2004, IT Professional.
[8] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[9] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[10] Haojin Zhu,et al. A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs , 2011, 2011 IEEE International Conference on Communications (ICC).
[11] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[12] Dirk Pesch,et al. Event Suppression for Safety Message Dissemination in VANETs , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[13] Jean-Pierre Hubaux,et al. Securing wireless mesh networks , 2006, IEEE Wireless Communications.