Distributed Data Fusion for Detecting Sybil Attacks in VANETs
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] H. B. Mitchell,et al. Multi-Sensor Data Fusion: An Introduction , 2007 .
[3] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[4] Martin Mauve,et al. Probabilistic aggregation for data dissemination in VANETs , 2007, VANET '07.
[5] Bertrand Ducourthial,et al. On the Sybil attack detection in VANET , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[6] Gongjun Yan,et al. Providing VANET security through active position detection , 2008, Comput. Commun..
[7] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[8] Arthur P. Dempster,et al. Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[9] Véronique Berge-Cherfaoui,et al. Distributed data fusion: application to confidence management in vehicular networks , 2008, 2008 11th International Conference on Information Fusion.
[10] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[11] T. Denœux. Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence , 2008 .
[12] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[13] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[14] Bayesian network model for data incest in a distributed sensor network , 2004 .
[15] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[16] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Jin Wang,et al. A new evidential trust model for open communities , 2009, Comput. Stand. Interfaces.
[18] Giorgos Zacharia,et al. Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..
[19] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[20] Philippe Smets,et al. Belief functions: The disjunctive rule of combination and the generalized Bayesian theorem , 1993, Int. J. Approx. Reason..
[21] Thierry Denoeux,et al. Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence , 2008, Artif. Intell..