暂无分享,去创建一个
Kun Jiang | Jun Zhang | Yuexin Zhang | Shigang Liu | Yang Xiang | Robert Abbas | Mahdi Dibaei | Shui Yu | Yao Deng | Sheng Wen | Sasa Maric | Xi Zheng | S. Wen | Jun Zhang | Mahdi Dibaei | Shui Yu | Yang Xiang | Shigang Liu | Yao Deng | Xi Zheng | Kun Jiang | Sasa Maric | R. Abbas | Yuexin Zhang
[1] Paul Rad,et al. Driverless vehicle security: Challenges and future research opportunities , 2020, Future Gener. Comput. Syst..
[2] Jin Cui,et al. A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.
[3] Attiya Baqai,et al. Experimental Evaluation of Intelligent Transport System with VLC Vehicle-to-Vehicle Communication , 2019, Wirel. Pers. Commun..
[4] Robert Abbas,et al. Security and reliability performance analysis for two-way wireless energy harvesting based untrusted relaying with cooperative jamming , 2019, IET Commun..
[5] Paul Rimba,et al. Data-Driven Cybersecurity Incident Prediction: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[6] Guizhen Yu,et al. Virus-traffic coupled dynamic model for virus propagation in vehicle-to-vehicle communication networks , 2018, Veh. Commun..
[7] John Yearwood,et al. A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network , 2018, J. Parallel Distributed Comput..
[8] Kiyoung Choi,et al. Deep neural networks with weighted spikes , 2018, Neurocomputing.
[9] Kun Jiang,et al. Intelligent and connected vehicles: Current status and future perspectives , 2018, Science China Technological Sciences.
[10] Geoffrey E. Hinton. Deep Learning-A Technology With the Potential to Transform Health Care. , 2018, JAMA.
[11] Nirwan Ansari,et al. A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] Jeremy Bryans,et al. Building an automotive security assurance case using systematic security evaluations , 2018, Comput. Secur..
[13] Rafal Leszczyna,et al. A review of standards with cybersecurity requirements for smart grid , 2018, Comput. Secur..
[14] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[15] Miroslaw Staron,et al. Software traceability in the automotive domain: Challenges and solutions , 2018, J. Syst. Softw..
[16] Abdullah Al Nahid,et al. Effective Intrusion Detection System Using XGBoost , 2018, Inf..
[17] Christine Julien,et al. Efficient and Scalable Runtime Monitoring for Cyber–Physical System , 2018, IEEE Systems Journal.
[18] Xi Zhang,et al. The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[19] Weihua Zhuang,et al. User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks , 2018, IEEE Transactions on Vehicular Technology.
[20] Ajay Kaul,et al. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..
[21] Ajay Kaul,et al. Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..
[22] Xinyi Huang,et al. A matrix-based cross-layer key establishment protocol for smart homes , 2018, Inf. Sci..
[23] Quanyan Zhu,et al. Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[24] Jian Shen,et al. An over-the-air key establishment protocol using keyless cryptography , 2018, Future Gener. Comput. Syst..
[25] Senlin Luo,et al. Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs , 2018, Comput. Stand. Interfaces.
[26] Shouhuai Xu,et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.
[27] Irfan-Ullah Awan,et al. CloudIntell: An intelligent malware detection system , 2017, Future Gener. Comput. Syst..
[28] Xiao Liu,et al. SmartVM: a SLA-aware microservice deployment framework , 2018, World Wide Web.
[29] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[30] Christine Julien,et al. Perceptions on the State of the Art in Verification and Validation in Cyber-Physical Systems , 2017, IEEE Systems Journal.
[31] Xuelong Li,et al. Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[32] Lynn Batten,et al. Cyber security attacks to modern vehicular systems , 2017, J. Inf. Secur. Appl..
[33] Bruno Crispo,et al. Security and privacy in vehicular communications: Challenges and opportunities , 2017, Veh. Commun..
[34] Hamid Reza Shahriari,et al. Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques , 2017, ACM Comput. Surv..
[35] Yaqin Zhou,et al. Automated identification of security issues from commit messages and bug reports , 2017, ESEC/SIGSOFT FSE.
[36] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[37] Huy Kang Kim,et al. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[38] Avishai Wool,et al. Field classification, modeling and anomaly detection in unknown CAN bus networks , 2017, Veh. Commun..
[39] Guihai Chen,et al. Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.
[40] Matti Latva-aho,et al. Vehicle clustering for improving enhanced LTE-V2X network performance , 2017, 2017 European Conference on Networks and Communications (EuCNC).
[41] Sevil Sen,et al. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.
[42] Tao Zhang,et al. Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.
[43] Volker Willert,et al. Efficient graph-based V2V free space fusion , 2017, 2017 IEEE Intelligent Vehicles Symposium (IV).
[44] Markus Kucera,et al. Automotive E/E-architecture enhancements by usage of ethernet TSN , 2017, 2017 13th Workshop on Intelligent Solutions in Embedded Systems (WISES).
[45] Aubrey Alston. Attribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems , 2017, ArXiv.
[46] Christine Julien,et al. Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems , 2017, ACM Trans. Embed. Comput. Syst..
[47] Qiang Ni,et al. Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.
[48] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[49] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[50] Georgia Sakellari,et al. Computation offloading of a vehicle's continuous intrusion detection workload for energy efficiency and performance , 2017, Simul. Model. Pract. Theory.
[51] Sherif Aly. Consolidating AUTOSAR with Complex Operating Systems (AUTOSAR on Linux) , 2017 .
[52] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[53] Md. Rafiqul Islam,et al. Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data , 2017, Inf. Sci..
[54] Xi Zheng,et al. Security analysis of modern mission critical android mobile applications , 2017, ACSW.
[55] William R. Harris,et al. Efficient Protection of Path-Sensitive Control Security , 2017, USENIX Security Symposium.
[56] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[57] A. Jefferson Offutt,et al. Mutation operators for testing Android apps , 2017, Inf. Softw. Technol..
[58] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[59] Nirwan Ansari,et al. EdgeIoT: Mobile Edge Computing for the Internet of Things , 2016, IEEE Communications Magazine.
[60] Mahima Gupta,et al. Infrastructure-less Vehicular Communication System Using Li-Fi Technology , 2016 .
[61] Ventzislav Nikov,et al. Low-Latency ECDSA Signature Verification—A Road Toward Safer Traffic , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[62] Jun Zhang,et al. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.
[63] Xiang-Yang Li,et al. Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.
[64] Faissal El Bouanani,et al. A secure cooperative transmission model in VANET using attribute based encryption , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).
[65] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[66] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[67] Mashrur Chowdhury,et al. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network – Performance evaluation , 2016 .
[68] Yanfang Ye,et al. Malicious sequential pattern mining for automatic malware detection , 2016, Expert Syst. Appl..
[69] Simon Fürst,et al. AUTOSAR for Connected and Autonomous Vehicles: The AUTOSAR Adaptive Platform , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[70] Jamal Bentahar,et al. CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks , 2016, Expert Syst. Appl..
[71] Nanning Zheng,et al. On-Road Vehicle Detection and Tracking Using MMW Radar and Monovision Fusion , 2016, IEEE Transactions on Intelligent Transportation Systems.
[72] S. Balaji,et al. Smart vehicular communication system using Li Fi technology , 2016, 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC).
[73] Guillermo L. Grinblat,et al. Toward Large-Scale Vulnerability Discovery using Machine Learning , 2016, CODASPY.
[74] Md. Rafiqul Islam,et al. Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..
[75] Liehuang Zhu,et al. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.
[76] Sazzadur Chowdhury,et al. In-Vehicle Networks Outlook: Achievements and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[77] Huy Kang Kim,et al. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).
[78] P. Langjahr,et al. Cross-domain vehicle control units in modern E/E architectures , 2016 .
[79] Paulo Resende,et al. Standardization of Generic Architecture for Autonomous Driving: A Reality Check , 2016 .
[80] Azzedine Boukerche,et al. Geo-localized content availability in VANETs , 2016, Ad Hoc Networks.
[81] Sun Hongbin,et al. Frontal object perception for Intelligent Vehicles based on radar and camera fusion , 2016, 2016 35th Chinese Control Conference (CCC).
[82] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[83] Harald Haas,et al. What is LiFi? , 2015, 2015 European Conference on Optical Communication (ECOC).
[84] Mohamed Azab,et al. Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .
[85] Lionel C. Briand,et al. Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning , 2015, IEEE Transactions on Dependable and Secure Computing.
[86] Christine Julien,et al. BraceAssertion: Runtime Verification of Cyber-Physical Systems , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[87] Matthew Smith,et al. VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits , 2015, CCS.
[88] Xiaorong Zhu,et al. Li-Fi: Light fidelity-a survey , 2015, Wirel. Networks.
[89] Emilio Frazzoli,et al. The Impact of Cooperative Perception on Decision Making and Planning of Autonomous Vehicles , 2015, IEEE Intelligent Transportation Systems Magazine.
[90] Roberto Di Pietro,et al. ESC: An efficient, scalable, and crypto-less solution to secure wireless networks , 2015, Comput. Networks.
[91] Mohammed M. Bait-Suwailam,et al. Design and implementation of a vehicle to vehicle communication system using Li-Fi technology , 2015, 2015 International Conference on Information and Communication Technology Research (ICTRC).
[92] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[93] Emilio Frazzoli,et al. Multivehicle Cooperative Driving Using Cooperative Perception: Design and Experimental Validation , 2015, IEEE Transactions on Intelligent Transportation Systems.
[94] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[95] Anand Rajan,et al. Automotive Security Best Practices , 2015 .
[96] Bayu Adhi Tama,et al. A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[97] Marcus Obst,et al. Multi-sensor data fusion for checking plausibility of V2V communications by vision-based multiple-object tracking , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[98] Marcelo H. Ang,et al. Vehicle motion intention reasoning using cooperative perception on urban road , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[99] Nanning Zheng,et al. Bionic vision inspired on-road obstacle detection and tracking using radar and visual information , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[100] Kirsten Matheus. Automotive Ethernet , 2014 .
[101] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[102] Thorsten Holz,et al. Static Detection of Second-Order Vulnerabilities in Web Applications , 2014, USENIX Security Symposium.
[103] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[104] Shiyu Song,et al. Robust Scale Estimation in Real-Time Monocular SFM for Autonomous Driving , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[105] Sidi-Mohammed Senouci,et al. A new Intrusion Detection Framework for Vehicular Networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[106] Mohan M. Trivedi,et al. Looking-in and looking-out vision for Urban Intelligent Assistance: Estimation of driver attentive state and dynamic surround for safe merging and braking , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.
[107] Hannes Federrath,et al. REST-Net: A dynamic rule-based IDS for VANETs , 2014, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC).
[108] H. Haas,et al. A 3-Gb/s Single-LED OFDM-Based Wireless VLC Link Using a Gallium Nitride $\mu{\rm LED}$ , 2014, IEEE Photonics Technology Letters.
[109] Xi Zheng. Physically informed assertions for cyber physical systems development and debugging , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[110] Constantinos Patsakis,et al. Towards a distributed secure in-vehicle communication architecture for modern vehicles , 2014, Comput. Secur..
[111] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[112] Sun-Young Hwang,et al. Robust Range Estimation with a Monocular Camera for Vision-Based Forward Collision Warning System , 2014, TheScientificWorldJournal.
[113] Xu Ji. Automotive Air Conditioning Control System Based on STC12C5A60S2 Singlechip , 2014 .
[114] Milan Petkovic,et al. Attribute-based encryption with encryption and decryption outsourcing , 2014 .
[115] Jussi Kangasharju,et al. Measuring large-scale distributed systems: case of BitTorrent Mainline DHT , 2013, IEEE P2P 2013 Proceedings.
[116] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[117] Johannes Sametinger,et al. Software Security , 2013, 2013 20th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS).
[118] Thomas Peyrin,et al. Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[119] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[120] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[121] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[122] Jussi Kangasharju,et al. Real-world sybil attacks in BitTorrent mainline DHT , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[123] Flavio D. Garcia,et al. Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.
[124] Keith Yu Kit Leung,et al. Decentralized Cooperative SLAM for Sparsely-Communicating Robot Networks: A Centralized-Equivalent Approach , 2012, J. Intell. Robotic Syst..
[125] Steffen Müller,et al. Automotive Ethernet, a Holistic Approach for a Next Generation In-Vehicle Networking Standard , 2012 .
[126] Claire Le Goues,et al. GenProg: A Generic Method for Automatic Software Repair , 2012, IEEE Transactions on Software Engineering.
[127] Robert Bosch,et al. CAN with Flexible Data-Rate , 2012 .
[128] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[129] Christian Weií,et al. V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology , 2011 .
[130] Purnendu Sinha. Architectural design and reliability analysis of a fail-operational brake-by-wire system from ISO 26262 perspectives , 2011, Reliab. Eng. Syst. Saf..
[131] Dijiang Huang,et al. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.
[132] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[133] Yen-Cheng Chen,et al. ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[134] Keiichi Uchimura,et al. Driver Inattention Monitoring System for Intelligent Vehicles: A Review , 2009, IEEE Transactions on Intelligent Transportation Systems.
[135] Christian Weiß,et al. V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology , 2011, Comput. Networks.
[136] Kpatcha M. Bayarou,et al. Intrusion detection in VANETs through verification of vehicle movement data , 2010, 2010 IEEE Vehicular Networking Conference.
[137] Magnus Egerstedt,et al. Autonomous driving in urban environments: approaches, lessons and challenges , 2010, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[138] Andreas Pitsillides,et al. A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.
[139] Xiaoyan Hong,et al. Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption , 2010, 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).
[140] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[141] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[142] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[143] Rex Chen,et al. TARI: Meeting Delay Requirements in VANETs with Efficient Authentication and Revocation , 2009 .
[144] Mario Gerla,et al. Dynamic Attributes Design in Attribute Based Encryption , 2009 .
[145] David Hovemeyer,et al. Using Static Analysis to Find Bugs , 2008, IEEE Software.
[146] Ulf Nilsson,et al. A Comparative Study of Industrial Static Analysis Tools , 2008, SSV.
[147] Jared D. DeMott,et al. Fuzzing for Software Security Testing and Quality Assurance , 2008 .
[148] Sean W. Smith,et al. PPAA: Peer-to-Peer Anonymous Authentication , 2008, ACNS.
[149] D.G. Johnson. Development of a high resolution MMW radar employing an antenna with combined frequency and mechanical scanning , 2008, 2008 IEEE Radar Conference.
[150] Pin-Han Ho,et al. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[151] Xuemin Shen,et al. PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[152] Erik Lindholm,et al. NVIDIA Tesla: A Unified Graphics and Computing Architecture , 2008, IEEE Micro.
[153] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[154] Erland Jonsson,et al. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.
[155] Xuemin Shen,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[156] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[157] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[158] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[159] Huirong Fu,et al. Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[160] P Iang. The Design and Implementation Signal Processing System of the Automotive Collision Avoidance Based on TMS320VC5402 , 2007 .
[161] Gianni Conte,et al. Vision-based Automated Vehicle Guidance: the experience of the ARGO vehicle , 2007 .
[162] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[163] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[164] C. Eckert,et al. Secure Revocable Anonymous Authenticated Inter-Vehicle Communication ( SRAAC ) , 2006 .
[165] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[166] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[167] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[168] S. Zhu,et al. GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[169] O. Mano,et al. Forward collision warning with a single camera , 2004, IEEE Intelligent Vehicles Symposium, 2004.
[170] Takeo Kato,et al. An obstacle detection method by fusion of radar and motion stereo , 2002, SICE 2003 Annual Conference (IEEE Cat. No.03TH8734).
[171] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[172] Liu Bo. OSEK/VDX--An Open-Architectured Platform of Vehicle Electronics System , 2002 .
[173] E. Zeeb. Optical data bus systems in cars: current status and future challenges , 2001, Proceedings 27th European Conference on Optical Communication (Cat. No.01TH8551).
[174] Massimo Bertozzi,et al. Architectural Issues on Vision-Based Automatic Vehicle Guidance: The Experience of the ARGO Project , 2000, Real Time Imaging.
[175] Massimo Bertozzi,et al. Vision-based intelligent vehicles: State of the art and perspectives , 2000, Robotics Auton. Syst..
[176] Markus Maurer,et al. A compact vision system for road vehicle guidance , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[177] Ramakrishnan Srikant,et al. Mining Sequential Patterns: Generalizations and Performance Improvements , 1996, EDBT.
[178] Bowen Alpern,et al. Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..