Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
暂无分享,去创建一个
Khattab M. Ali Alheeti | Anna Gruebler | Klaus D. McDonald-Maier | K. Mcdonald-Maier | K. Alheeti | A. Gruebler
[1] Guizhen Yu,et al. A vehicular ad hoc networks intrusion detection system based on BUSNet , 2010, 2010 2nd International Conference on Future Computer and Communication.
[2] Khattab M. Ali Alheeti,et al. An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars , 2015, 2015 Sixth International Conference on Emerging Security Technologies (EST).
[3] Christian Bonnet,et al. Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.
[4] Klaus D. McDonald-Maier,et al. On the detection of grey hole and rushing attacks in self-driving vehicular networks , 2015, 2015 7th Computer Science and Electronic Engineering Conference (CEEC).
[5] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[6] Andrew J. Connolly,et al. Statistics, Data Mining, and Machine Learning in Astronomy , 2014 .
[7] Dong-You Choi,et al. A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[8] J. Friedman. Regularized Discriminant Analysis , 1989 .
[9] Amit Konar,et al. Performance analysis of LDA, QDA and KNN algorithms in left-right limb movement classification from EEG data , 2010, 2010 International Conference on Systems in Medicine and Biology.
[10] Nadir Shah,et al. Modeling Vehicles Mobility for Connectivity Analysis in VANET , 2016 .
[11] Vytautas Rudzionis,et al. Evaluation of methods to combine different speech recognizers , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).
[12] Priyanka Pandey,et al. Mycosec - A database for signal peptide bearing genes of mycobacterium , 2011 .
[13] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[14] Anil Kumar,et al. Design an anomaly based fuzzy intrusion detection system for packet dropping attack in mobile ad hoc networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[15] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[16] Sherali Zeadally,et al. Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges , 2015, J. Netw. Comput. Appl..
[17] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[18] Mubashir Husain Rehmani,et al. Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..
[19] Chien-Ming Chou,et al. Realistic mobility models for Vehicular Ad hoc Network (VANET) simulations , 2008, 2008 8th International Conference on ITS Telecommunications.
[20] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[21] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[22] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[23] Guanrong Chen,et al. Introduction to Fuzzy Sets, Fuzzy Logic, and Fuzzy Control Systems , 2000 .
[24] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[25] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[26] Sami Muhaidat,et al. Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[27] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[28] D. P. Agrawal,et al. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[29] Dong Ho Park,et al. Hybrid kernel density estimation for discriminant analysis with information complexity and genetic algorithm , 2016, Knowl. Based Syst..
[30] Sidi-Mohammed Senouci,et al. An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.
[31] Khattab M. Ali Alheeti,et al. An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[32] Rich Caruana,et al. Data mining in metric space: an empirical analysis of supervised learning performance criteria , 2004, ROCAI.
[33] Nilesh U. Sambhe,et al. A review on cross layer intrusion detection system in wireless ad hoc network , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[34] Michael Menth,et al. Analysis of Cooperative Awareness Message rates in VANETs , 2013, 2013 13th International Conference on ITS Telecommunications (ITST).
[35] Özgür B. Akan,et al. Cognitive radio sensor networks , 2009, IEEE Network.
[36] Aikaterini Mitrokotsa,et al. Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks , 2006 .
[37] Ghassan Samara,et al. Security issues and challenges of Vehicular Ad Hoc Networks (VANET) , 2010, 4th International Conference on New Trends in Information Science and Service Science.
[38] Christos Douligeris,et al. Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks , 2006 .
[39] Warnakulasuriya Anil Chandana Fernando,et al. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).
[40] Boucif Amar Bensaber,et al. Decision support protocol for intrusion detection in VANETs , 2013, DIVANet '13.
[41] Saloua Chettibi,et al. Trace file analyzer for ad hoc routing protocols simulation with NS2 , 2015, 2015 First International Conference on New Technologies of Information and Communication (NTIC).
[42] Robert Bronte,et al. A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm , 2016, SIN.
[43] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[44] Chris McDonald,et al. Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .
[45] Mohamed Oussama Cherif. Optimization of V2V and V2I communications in an operated vehicular network , 2010 .
[46] Sidi-Mohammed Senouci,et al. A new Intrusion Detection Framework for Vehicular Networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[47] Shiyong Zhang,et al. Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).
[48] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[49] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[50] Sidi-Mohammed Senouci,et al. Efficient data dissemination in cooperative vehicular networks , 2013, Wirel. Commun. Mob. Comput..
[51] Abderrahmane Lakas,et al. Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).
[52] Sidi-Mohammed Senouci,et al. Detection and prevention from misbehaving intruders in vehicular networks , 2014, 2014 IEEE Global Communications Conference.
[53] Udo W. Pooch,et al. Cooperative security-enforcement routing in mobile ad hoc networks , 2002, 4th International Workshop on Mobile and Wireless Communications Network.