Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology
暂无分享,去创建一个
Nirwan Ansari | Hichem Sedjelmaci | Sidi Mohammed Senouci | N. Ansari | S. Senouci | Hichem Sedjelmaci
[1] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[2] Sidi-Mohammed Senouci,et al. Network connectivity and area coverage for UAV fleet mobility model with energy constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[3] G. Holland,et al. Applications of Aerosondes in the Arctic , 2004 .
[4] Christian Bettstetter,et al. Channel measurements over 802.11a-based UAV-to-ground links , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[5] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[6] Hamid Jafarkhani,et al. UAV-aided cross-layer routing for MANETs , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[7] Evsen Yanmaz. Connectivity versus area coverage in unmanned aerial vehicle networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[8] Ing-Ray Chen,et al. Specification based intrusion detection for unmanned aircraft systems , 2012, Airborne '12.
[9] Sidi-Mohammed Senouci,et al. Detection and prevention from misbehaving intruders in vehicular networks , 2014, 2014 IEEE Global Communications Conference.
[10] Sherali Zeadally,et al. Sustainable Transportation Management System for a Fleet of Electric Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[11] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] Ryu Miura,et al. Toward Fair Maximization of Energy Efficiency in Multiple UAS-Aided Networks: A Game-Theoretic Methodology , 2015, IEEE Transactions on Wireless Communications.
[13] Ouns Bouachir,et al. A mobility model for UAV ad hoc network , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).
[14] Zhu Han,et al. Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles , 2009, IEEE Transactions on Vehicular Technology.
[15] Xiang Cheng,et al. D2D for Intelligent Transportation Systems: A Feasibility Study , 2015, IEEE Transactions on Intelligent Transportation Systems.
[16] Bernhard Rinner,et al. On path planning strategies for networked unmanned aerial vehicles , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[17] Nirwan Ansari,et al. Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks , 2007, IEEE Wireless Communications.
[18] Tansu Alpcan,et al. Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[19] Sidi-Mohammed Senouci,et al. An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.
[20] Kalyanmoy Deb,et al. Multiple Criteria Decision Making, Multiattribute Utility Theory: Recent Accomplishments and What Lies Ahead , 2008, Manag. Sci..
[21] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[22] Vashek Matyas,et al. Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.
[23] Sally McClean,et al. Maintaining connectivity in UAV swarm sensing , 2010, 2010 IEEE Globecom Workshops.
[24] Ryu Miura,et al. An optimal data collection technique for improved utility in UAS-aided networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[25] Prabir Bhattacharya,et al. A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[26] Xiang Cheng,et al. Envelope Level Crossing Rate and Average Fade Duration of Nonisotropic Vehicle-to-Vehicle Ricean Fading Channels , 2014, IEEE Transactions on Intelligent Transportation Systems.
[27] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[28] Azzedine Boukerche,et al. A joint 3D localization and synchronization solution for Wireless Sensor Networks using UAV , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[29] Naveen K. Chilamkurti,et al. Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.
[30] Zhu Han,et al. Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.
[31] Ivan Stojmenovic,et al. Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.