Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data
暂无分享,去创建一个
[1] Suvrajeet Sen,et al. Controlled Optimization of Phases at an Intersection , 1997, Transp. Sci..
[2] Alexandre M. Bayen,et al. Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security , 2016 .
[3] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[4] Yiheng Feng,et al. A real-time adaptive signal control in a connected vehicle environment , 2015 .
[5] Hanghang Tong,et al. Spatial-temporal traffic flow pattern identification and anomaly detection with dictionary-based compression theory in a large-scale urban network , 2016 .
[6] Carlos F. Daganzo,et al. THE CELL TRANSMISSION MODEL, PART II: NETWORK TRAFFIC , 1995 .
[7] Christian G. Claudel,et al. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming , 2013, ICNC.
[8] Saurabh Amin,et al. Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[9] C. Daganzo. THE CELL TRANSMISSION MODEL.. , 1994 .
[10] Yevgeniy Vorobeychik,et al. Vulnerability of fixed-time control of signalized intersections to cyber-tampering , 2016, 2016 Resilience Week (RWS).
[11] Tobias Jeske. Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic , 2013 .