An intrusion detection system for connected vehicles in smart cities
暂无分享,去创建一个
Yaser Jararweh | Moayad Aloqaily | Safa Otoum | Ismaeel Al Ridhawi | M. Aloqaily | S. Otoum | Y. Jararweh | I. A. Ridhawi | Safa Otoum | Moayad Aloqaily
[1] Saad Amin,et al. A New Digital Forensics Model of Smart City Automated Vehicles , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[2] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[3] Carla Purdy,et al. Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[4] H. T. Mouftah,et al. Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures , 2018, 2018 IEEE International Conference on Communications (ICC).
[5] Tomas Olovsson,et al. Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[6] R K Narla Siva,et al. コネクテッドビークル技術の進化:スマートドライバーからスマートカーへ...自律運転自動車へ | 文献情報 | J-GLOBAL 科学技術総合リンクセンター , 2013 .
[7] Lijuan Zheng,et al. Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[8] Shahzad Khan,et al. Artificial intelligence framework for smart city microgrids: State of the art, challenges, and opportunities , 2018, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC).
[9] Tat-Chee Wan,et al. Links Lifetime Estimation Based on Nodes Affinity in Wireless Ad-hoc Networks , 2008, 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies.
[10] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[11] Jin-Woo Jung,et al. Electric vehicles and smart grid interaction: A review on vehicle to grid and renewable energy sources integration , 2014 .
[12] Mohammad Reza Parsaei,et al. A Hybrid Data Mining Approach for Intrusion Detection on Imbalanced NSL-KDD Dataset , 2016 .
[13] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[14] Michael Patriksson,et al. A Mixed User‐Equilibrium and System‐Optimal Traffic Flow for Connected Vehicles Stated as a Complementarity Problem , 2017, Comput. Aided Civ. Infrastructure Eng..
[15] Yaser Jararweh,et al. Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.
[16] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014 .
[17] Quanyan Zhu,et al. Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[18] Siva R K Narla,et al. The Evolution of Connected Vehicle Technology: From Smart Drivers to Smart Cars to....Self-Driving Cars. , 2013 .
[19] Fredrik Gustafsson,et al. Particle filters for positioning, navigation, and tracking , 2002, IEEE Trans. Signal Process..
[20] Burak Kantarci,et al. Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.
[21] Xuemin Shen,et al. Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.
[22] Gill,et al. Automated vehicles: the coming of the next disruptive technology , 2015 .
[23] Dewan Md. Farid,et al. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.
[24] H. T. Mouftah,et al. Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud , 2016, IEEE Access.
[25] Sherali Zeadally,et al. Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.
[26] Ali Kariminezhad,et al. Optimal Power Splitting for Simultaneous Information Detection and Energy Harvesting , 2017, IEEE Signal Processing Letters.
[27] Ayaz Ahmad,et al. A review of EVs charging: From the perspective of energy optimization, optimization approaches, and charging techniques , 2018, Transportation Research Part D: Transport and Environment.
[28] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[29] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[30] Dietmar P. F. Möller,et al. Intrusion detection in connected cars , 2017, 2017 IEEE International Conference on Electro Information Technology (EIT).
[31] Yaser Jararweh,et al. Congestion Mitigation in Densely Crowded Environments for Augmenting QoS in Vehicular Clouds , 2018, DIVANet'18.
[32] Shiwen Mao,et al. Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey , 2018, IEEE Communications Surveys & Tutorials.
[33] Simone A. Ludwig. Intrusion detection of multiple attack classes using a deep neural net ensemble , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[34] A. K. Pujari,et al. Data Mining Techniques , 2006 .
[35] M. Repetto,et al. Design of Wireless Power Transmission for a Charge While Driving System , 2014, IEEE Transactions on Magnetics.
[36] Marion Berbineau,et al. Chain-Branch-Leaf: A clustering scheme for vehicular networks using only V2V communications , 2018, Ad Hoc Networks.
[37] Hussein T. Mouftah,et al. Connected and Autonomous Electric Vehicles (CAEVs) , 2018, IT Professional.
[38] Kshirasagar Naik,et al. Evaluating Electric Vehicles’ Response Time to Regulation Signals in Smart Grids , 2018, IEEE Transactions on Industrial Informatics.
[39] Hong Liu,et al. Securing wireless communications of connected vehicles with artificial intelligence , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).
[40] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[41] Geoffrey E. Hinton. Training Products of Experts by Minimizing Contrastive Divergence , 2002, Neural Computation.
[42] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[43] Yaser Jararweh,et al. A collaborative mobile edge computing and user solution for service composition in 5G systems , 2018, Transactions on Emerging Telecommunications Technologies.
[44] Ismaeel Al Ridhawi,et al. Workflow-Net Based Service Composition Using Mobile Edge Nodes , 2017, IEEE Access.
[45] H. T. Mouftah,et al. Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[46] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[47] Ahmed Karmouch,et al. Simulator-Assisted Joint Service-Level-Agreement and Vertical-Handover Adaptation for Profit Maximization , 2012, 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet.
[48] Qiang Ni,et al. Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.
[49] Baoyi Wang,et al. Research on Feature Selection Method of Intrusion Detection Based on Deep Belief Network , 2015 .
[50] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.
[51] Dipak Ghosal,et al. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.
[52] Benyuan Liu,et al. Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devices , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[53] Helena Rifà-Pous,et al. Attack Classification Schema for Smart City WSNs , 2017, Sensors.
[54] Christian Bonnet,et al. Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.
[55] Leandros A. Maglaras,et al. Social Internet of Vehicles for Smart Cities , 2016, J. Sens. Actuator Networks.
[56] H. T. Mouftah,et al. Vehicle as a resource for continuous service availability in smart cities , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[57] Marina Thottan,et al. Market sharing games applied to content distribution in ad hoc networks , 2006, IEEE J. Sel. Areas Commun..
[58] H. T. Mouftah,et al. A continuous diversified vehicular cloud service availability framework for smart cities , 2018, Comput. Networks.