Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks That Cause Traffic Congestion
暂无分享,去创建一个
[1] Andrew McCallum,et al. Introduction to Statistical Relational Learning , 2007 .
[2] Bart De Schutter,et al. Cross-Entropy Optimization of Control Policies With Adaptive Basis Functions , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[3] Jean-Pierre Hubaux,et al. A Survey of Research in Inter-Vehicle Communications , 2006 .
[4] D. Bertsekas. Approximate policy iteration: a survey and some new methods , 2011 .
[5] Amer Aijaz,et al. Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .
[6] Peter Stone,et al. Multiagent traffic management: an improved intersection control mechanism , 2005, AAMAS '05.
[7] Dimitri P. Bertsekas,et al. Basis function adaptation methods for cost approximation in MDP , 2009, 2009 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning.
[8] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[9] R. Tatchikou,et al. Cooperative vehicle collision avoidance using inter-vehicle packet forwarding , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[10] David J. Thuente,et al. Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .
[11] Markus Jakobsson,et al. Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[12] J. Bouchaud. An introduction to statistical finance , 2002 .
[13] George Cardona,et al. Pāṇini : a survey of research , 1976 .
[14] Shie Mannor,et al. Adaptive Bases for Reinforcement Learning , 2010, ECML/PKDD.
[15] Maria Kihl,et al. Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.
[16] Peng Ning,et al. P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[17] R. Bellman. A Markovian Decision Process , 1957 .
[18] Raja Sengupta,et al. Cooperative Collision Warning: Enabling Crash Avoidance with Wireless Technology , 2005 .
[19] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[20] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[21] Bo Xu,et al. Monitoring neighboring vehicles for safety via V2V communication , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.
[22] Subir Biswas,et al. Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety , 2006, IEEE Communications Magazine.
[23] Gongjun Yan,et al. Cooperative Collision Warning through mobility and probability prediction , 2010, 2010 IEEE Intelligent Vehicles Symposium.
[24] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[25] Anish Arora,et al. Capabilities of Low-Power Wireless Jammers , 2009, IEEE INFOCOM 2009.
[26] D. Schrank,et al. 2012 Urban Mobility Report , 2002 .
[27] Tim Leinmüller,et al. Influence of falsified position data on geographic ad-hoc routing , 2005 .
[28] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[29] John N. Tsitsiklis,et al. Neuro-Dynamic Programming , 1996, Encyclopedia of Machine Learning.
[30] Tamer A. ElBatt,et al. Cooperative collision warning using dedicated short range wireless communications , 2006, VANET '06.
[31] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.