Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions
暂无分享,去创建一个
Houda Labiod | Gilles Bourdon | Hassnaa Moustafa | Christian Tchepnda | H. Moustafa | H. Labiod | Christian Tchepnda | Gilles Bourdon
[1] C. Loebbecke,et al. Virtual Organizations That Cooperate and Compete: Managing the Risks of Knowledge Exchange , 2002 .
[2] Vijayan Sugumaran. Intelligent support systems : knowledge management , 2002 .
[3] Gerasimos C. Pagiatakis. Active optical access networks , 2003 .
[4] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[5] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[6] Nitin H. Vaidya,et al. A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[7] Azim Eskandarian,et al. The threat of intelligent collisions , 2004, IT Professional.
[8] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[9] Yvon Gourhant,et al. Providing Authentication and Access Control in Vehicular Network Environment , 2006, SEC.
[10] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[11] Panagiotis Papadimitratos,et al. Secure Position-Based Routing for VANETs , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[12] Vijayan Sugumaran. Intelligent Information Technologies and Applications , 2008 .
[13] Stavros Kotsopoulos,et al. Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms , 2008 .
[14] Alejandro Pazos Sierra,et al. Encyclopedia of Artificial Intelligence , 2008 .
[15] Houda Labiod,et al. Performance Analysis of a Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[16] R. Nedunchezhian,et al. Improved Privacy: Preserving Techniques in Large Database , 2008 .
[17] Francisco Javier Díaz Pernas,et al. Stream Processing of a Neural Classifier II , 2009, Encyclopedia of Artificial Intelligence.
[18] Huaqun Guo. Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange , 2009 .
[19] Javier Ibanez-Guzman. The Localisation Problem in Cooperative Vehicle Applications , 2009 .
[20] Chung-ming Huang,et al. Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications , 2009 .
[21] Hussein T. Mouftah,et al. Dynamic Bandwidth Allocation for Ethernet Passive Optical Networks , 2009 .
[22] Floriano De Rango,et al. Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs , 2009, Int. J. Interdiscip. Telecommun. Netw..
[23] Stelios C. A. Thomopoulos,et al. Simulation of Small-Scale Fading in Mobile Channel Models for Next-Generation Wireless Communications , 2009 .
[24] Satish V. Ukkusuri,et al. Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks , 2009 .
[25] Ioannis P. Chochliouros,et al. Optical Access Networks and Advanced Photonics: Technologies and Deployment Strategies , 2009 .
[26] Starsky H. Y. Wong,et al. Inter-Domain Routing in Mobile Ad Hoc Networks : Challenges and New Directions , 2010 .