暂无分享,去创建一个
[1] Yevgeniy Vorobeychik,et al. Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game , 2018, Comput. Secur..
[2] Tansu Alpcan,et al. Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[3] Manu Sood,et al. Survey on sybil attack defense mechanisms in wireless ad hoc networks , 2018, J. Netw. Comput. Appl..
[4] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[5] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[6] Xue Liu,et al. Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI , 2019, IEEE Transactions on Mobile Computing.
[7] Aaron Hunter,et al. A Security Analysis of an In-Vehicle Infotainment and App Platform , 2016, WOOT.
[8] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[9] Syed Asad Hussain,et al. A game theory based trust model for Vehicular Ad hoc Networks (VANETs) , 2017, Comput. Networks.
[10] Dipak Ghosal,et al. Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms , 2018, 2018 IEEE Vehicular Networking Conference (VNC).
[11] Robert Laddaga,et al. Deriving Cyber-security Requirements for Cyber Physical Systems , 2019, ArXiv.
[12] Daniel Krajzewicz,et al. Traffic Simulation with SUMO – Simulation of Urban Mobility , 2010 .
[13] Carlo Ghezzi,et al. On the Interplay Between Cyber and Physical Spaces for Adaptive Security , 2018, IEEE Transactions on Dependable and Secure Computing.
[14] Jim Duggan,et al. An Experimental Review of Reinforcement Learning Algorithms for Adaptive Traffic Signal Control , 2016, Autonomic Road Transport Support Systems.
[15] Shihong Huang,et al. Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data , 2018 .
[16] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[17] Pieter Abbeel,et al. Benchmarking Deep Reinforcement Learning for Continuous Control , 2016, ICML.
[18] Samira Moussaoui,et al. L-P2DSA: Location-based privacy-preserving detection of Sybil attacks , 2013, 2013 11th International Symposium on Programming and Systems (ISPS).
[19] Yiheng Feng,et al. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.
[20] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[21] Xiaoguang Yang,et al. A Review of the Self-Adaptive Traffic Signal Control System Based on Future Traffic Environment , 2018, Journal of Advanced Transportation.
[22] Morteza Babazadeh Shareh,et al. Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model , 2019, Inf. Sci..
[23] Stephen F. Smith,et al. Smart Urban Signal Networks: Initial Application of the SURTRAC Adaptive Traffic Signal Control System , 2013, ICAPS.
[24] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[25] G. Marchionni,et al. Analysis of Adaptive Traffic Control Systems Design of a Decision Support System for Better Choices , 2015 .
[26] Eric Bodden,et al. Towards ensuring security by design in cyber-physical systems engineering processes , 2018, ICSSP.
[27] John McHugh,et al. Sybil attacks as a mitigation strategy against the Storm botnet , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[28] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.
[29] Nirwan Ansari,et al. Cyber Security Game for Intelligent Transportation Systems , 2019, IEEE Network.
[30] F. Hall. TRAFFIC STREAM CHARACTERISTICS , 1997 .
[31] Aleksandar Stevanovic,et al. Adaptive Traffic Control Systems: Domestic and Foreign State of Practice , 2010 .
[32] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..