A flexible, subjective logic-based framework for misbehavior detection in V2V networks
暂无分享,去创建一个
[1] Ashish Vulimiri. Misbehavior Detection in Vehicular Ad Hoc Networks , 2009 .
[2] Soumaya Cherkaoui,et al. Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[3] Nsw Roads and Maritime Services. Intelligent Transport Systems (ITS) , 2016 .
[4] A. Jøsang. Artificial Reasoning with Subjective Logic , 2008 .
[5] Sorin A. Huss,et al. A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition , 2011, 2011 IEEE Vehicular Networking Conference (VNC).
[6] Tim Leinmüller,et al. Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.
[7] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[8] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[9] Michel Riveill,et al. A framework for trust assessment of sensor data , 2011, 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011).
[10] Klaus Diepold,et al. A Trust Model for Intervehicular Communication Based on Belief Theory , 2010, 2010 IEEE Second International Conference on Social Computing.
[11] Audun Jøsang,et al. Subjective Logic , 2016, Artificial Intelligence: Foundations, Theory, and Algorithms.
[12] Hannes Hartenstein,et al. VANET: Vehicular Applications and Inter-Networking Technologies , 2010, VANET.
[13] Audun Jøsang,et al. Base Rates for Belief Functions , 2013 .
[14] Marko Wolf,et al. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.
[15] Arobinda Gupta,et al. Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.
[16] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[17] Tim Leinmüller,et al. Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.