A Topological Approach to Secure Message Dissemination in Vehicular Networks
暂无分享,去创建一个
Changle Li | Guoqiang Mao | Degan Zhang | Jieqiong Chen | Guoqiang Mao | De-gan Zhang | Changle Li | Jieqiong Chen
[1] Saneeha Ahmed,et al. Novel Trust Framework for Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.
[2] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[3] Brian D. O. Anderson,et al. Graph Theoretic Models and Tools for the Analysis of Dynamic Wireless Multihop Networks , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[4] Panganamala Ramana Kumar,et al. A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks , 2017, IEEE Transactions on Control of Network Systems.
[5] Qing Yang,et al. Toward trustworthy vehicular social networks , 2015, IEEE Communications Magazine.
[6] Véronique Berge-Cherfaoui,et al. Detecting Road Events Using Distributed Data Fusion: Experimental Evaluation for the Icy Roads Case , 2016, IEEE Transactions on Intelligent Transportation Systems.
[7] Sushmita Ruj,et al. A social network approach to trust management in VANETs , 2012, Peer-to-Peer Networking and Applications.
[8] David R. Karger,et al. A new approach to the minimum cut problem , 1996, JACM.
[9] Fred L. Mannering,et al. Estimating Rear-End Accident Probabilities at Signalized Intersections: Occurrence-Mechanism Approach , 2003 .
[10] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1951 .
[11] W. Gray,et al. Optimal data fusion of correlated local decisions in multiple sensor detection systems , 1992 .
[12] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[13] A. Festag,et al. A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006 , 2006 .
[14] Jun Zhang,et al. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.
[15] Mashrur Chowdhury,et al. A Distributed Message Delivery Infrastructure for Connected Vehicle Technology Applications , 2018, IEEE Transactions on Intelligent Transportation Systems.
[16] Yiqing Zhou,et al. Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions , 2015, IEEE Communications Surveys & Tutorials.
[17] Brian D. O. Anderson,et al. Stochastic Characterization of Information Propagation Process in Vehicular Ad hoc Networks , 2014, IEEE Transactions on Intelligent Transportation Systems.
[18] Abdelfettah Belghith,et al. A distributed advanced analytical trust model for VANETs , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[19] Kai-Yuan Cai,et al. Multisensor Decision And Estimation Fusion , 2003, The International Series on Asian Studies in Computer and Information Science.
[20] Nathalie Mitton,et al. Delivery Delay Analysis for Roadside Unit Deployment in Vehicular Ad Hoc Networks With Intermittent Connectivity , 2016, IEEE Transactions on Vehicular Technology.
[21] Andrew V. Goldberg,et al. A new approach to the maximum flow problem , 1986, STOC '86.
[22] S. Gottwald,et al. Fuzzy set theory and its applications. Second edition , 1992 .
[23] Jorge Lobo,et al. Detecting distributed signature-based intrusion: The case of multi-path routing attacks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[24] Mohammad S. Obaidat,et al. Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.
[25] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[26] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[27] Yacine Ghamri-Doudane,et al. A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.
[28] Jean-Bernard Saloman. Probability and Statistics (Fourth Edition) , 2013 .
[29] Elyes Ben Hamida,et al. On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.
[30] Hendrik Decke,et al. A flexible, subjective logic-based framework for misbehavior detection in V2V networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[31] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[32] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[33] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[34] Sanjay E. Sarma,et al. A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.
[35] Frank Kargl,et al. Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[36] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[37] Frank Kargl,et al. Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.