CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network
暂无分享,去创建一个
Jing Zhang | Shuo Wang | Qianmu Li | Shunmei Meng | Jun Hou | Qianmu Li | Shuo Wang | J. Zhang | J. Hou | Shunmei Meng
[1] Hiro Onishi,et al. Paradigm change of vehicle cyber security , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[2] Deyu Wang,et al. Cognitive-inspired class-statistic matching with triple-constrain for camera free 3D object retrieval , 2019, Future Gener. Comput. Syst..
[3] Rongbo Zhu,et al. Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks , 2015, Mob. Networks Appl..
[4] Christoph Schmittner,et al. The Need for Safety and Cyber-Security Co-engineering and Standardization for Highly Automated Automotive Vehicles , 2016 .
[5] Araz Taeihagh,et al. Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks , 2018, Transport Reviews.
[6] Sankalp Bagaria,et al. Flexi-DNP3: Flexible distributed network protocol version 3 (DNP3) for SCADA security , 2011, 2011 International Conference on Recent Trends in Information Systems.
[7] Mark Talabis,et al. Information Security Risk Assessment: Risk Assessment , 2012 .
[8] N. Sklavos,et al. Aiming at Higher Network Security through Extensive Penetration Tests , 2012, IEEE Latin America Transactions.
[9] Chao Zhang,et al. CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[10] Morshed U. Chowdhury,et al. A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV) , 2017, ATCS/SePrIoT@SecureComm.
[11] Li,et al. Rough Outlier Detection Based Security Risk Analysis Methodology , 2012 .
[12] Xue Zhang,et al. ERDT: Energy-Efficient Reliable Decision Transmission for Intelligent Cooperative Spectrum Sensing in Industrial IoT , 2015, IEEE Access.
[13] Xiangyu Zhou,et al. Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things , 2019, IEEE Internet of Things Journal.
[14] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[15] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[16] Zhuhua Cai,et al. Software Vulnerability Discovery Techniques: A Survey , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[17] Jürgen Schmidhuber,et al. LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[18] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[19] Okyeon Yi,et al. Vulnerability Analysis and Security Modeling of MODBUS , 2016 .
[20] Tom Bartman,et al. Securing communications for SCADA and critical industrial systems , 2016, 2016 69th Annual Conference for Protective Relay Engineers (CPRE).
[21] Shaohua Wan,et al. A long video caption generation algorithm for big video data retrieval , 2019, Future Gener. Comput. Syst..
[22] Yudong Zhang,et al. On the Construction of Data Aggregation Tree With Maximizing Lifetime in Large-Scale Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[23] Naixue Xiong,et al. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information , 2015, Symmetry.
[24] Kim-Kwang Raymond Choo,et al. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..
[25] Ciyun Lin,et al. Research on Short-Term Traffic Flow Prediction Method Based on Similarity Search of Time Series , 2014 .
[26] Xuyun Zhang,et al. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..
[27] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[28] Mehul Motani,et al. An Optimal Cross-Layer Framework for Cognitive Radio Network Under Interference Temperature Model , 2016, IEEE Systems Journal.