GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs
暂无分享,去创建一个
[1] Juan-Carlos Cano,et al. A survey and comparative study of simulators for vehicular ad hoc networks (VANETs) , 2011, Wirel. Commun. Mob. Comput..
[2] Stephen B. Wicker,et al. Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] Stephen Yurkovich,et al. Fuzzy Control , 1997 .
[4] Kun-Chan Lan,et al. Rapid Generation of Realistic Mobility Models for VANET , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[5] G. H. Raisoni,et al. Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .
[6] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[7] John S. Baras,et al. Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.
[8] Mohamed Hamdi,et al. Recent advances in cryptographic solutions for vehicular networks , 2015, 2015 International Symposium on Networks, Computers and Communications (ISNCC).
[9] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[10] Jalel Ben-Othman,et al. Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks , 2014, 2014 IEEE Global Communications Conference.
[11] K. Psounis,et al. IEEE 802.11p performance evaluation and protocol enhancement , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.
[12] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[13] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[14] Robert LIN,et al. NOTE ON FUZZY SETS , 2014 .
[15] Jalel Ben-Othman,et al. Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks , 2009, 2009 IEEE International Conference on Communications.
[16] Yun-Pang Wang,et al. Simulation of Urban Mobility , 2013, Lecture Notes in Computer Science.
[17] G. H. Raisoni,et al. Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .
[18] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[19] George J. Klir,et al. Fuzzy sets and fuzzy logic - theory and applications , 1995 .
[20] Soufiene Djahel,et al. FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks , 2009, Int. J. Commun. Syst..
[21] Jelena V. Misic,et al. DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[22] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[23] Dimitar P. Filev,et al. Fuzzy SETS AND FUZZY LOGIC , 1996 .
[24] John S. Baras,et al. Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.
[25] Jun Luo,et al. A Survey of Inter-Vehicle Communication , 2004 .
[26] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[27] Kartik Gopalan,et al. Urban Mobility Models for VANETs , 2006 .
[28] Amit Kumar Saha,et al. Modeling mobility for vehicular ad-hoc networks , 2004, VANET '04.
[29] Jean-Yves Le Boudec,et al. A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.