Trajectory-Based Hierarchical Defense Model to Detect Cyber-Attacks on Transportation Infrastructure

[1]  Shihong Huang,et al.  Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data , 2018 .

[2]  Yiheng Feng,et al.  Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.

[3]  Wan Li,et al.  Traffic signal timing optimization in connected vehicles environment , 2017, 2017 IEEE Intelligent Vehicles Symposium (IV).

[4]  Yiheng Feng,et al.  Connected Vehicle–Based Adaptive Signal Control and Applications , 2016 .

[5]  Yiheng Feng,et al.  A real-time adaptive signal control in a connected vehicle environment , 2015 .

[6]  S. Ilgin Guler,et al.  Using connected vehicle technology to improve the efficiency of intersections , 2014 .

[7]  Jun Ding,et al.  Multi-modal traffic signal control with priority, signal actuation and coordination , 2014 .

[8]  William Whyte,et al.  A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.

[9]  Ilsoo Yun,et al.  Cumulative Travel-Time Responsive Real-Time Intersection Control Algorithm in the Connected Vehicle Environment , 2013 .

[10]  Dipak Ghosal,et al.  Adaptive Traffic Signal Control With Vehicular Ad hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[11]  Byungkyu Park,et al.  Traffic Signal Control with Connected Vehicles , 2013 .

[12]  Jun Ding,et al.  PAMSCOD: Platoon-based arterial multi-modal signal control with online data , 2011 .

[13]  Christian Priemer,et al.  A decentralized adaptive traffic signal control using V2I communication data , 2009, 2009 12th International IEEE Conference on Intelligent Transportation Systems.

[14]  Suvrajeet Sen,et al.  Controlled Optimization of Phases at an Intersection , 1997, Transp. Sci..