Detecting malicious behavior in a vehicular DTN for public transportation
暂无分享,去创建一个
Lars C. Wolf | Tobias Pögel | Sebastian Schildt | Yinghui Guo | L. Wolf | Tobias Pögel | S. Schildt | Yinghui Guo
[1] Alex Pentland,et al. DakNet: rethinking connectivity in developing nations , 2004, Computer.
[2] Anders Lindgren,et al. Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.
[3] Ali S. Hadi,et al. Finding Groups in Data: An Introduction to Chster Analysis , 1991 .
[4] Xiaodong Lin,et al. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.
[5] Anil K. Jain. Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..
[6] Sven Lahde,et al. A practical analysis of communication characteristics for mobile and distributed pollution measurements on the road , 2007, Wirel. Commun. Mob. Comput..
[7] Lars C. Wolf,et al. DTN routing in urban public transport systems , 2010, CHANTS '10.
[8] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[9] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[10] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[11] Vinton G. Cerf,et al. Delay-Tolerant Networking Architecture , 2007, RFC.
[12] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[13] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] Denis Laurendeau,et al. Award winning papers from the 19th International Conference on Pattern Recognition (ICPR) , 2010, Pattern Recognit. Lett..
[16] Srinivasan Keshav,et al. Very low-cost internet access using KioskNet , 2007, CCRV.
[17] W. Hamilton,et al. The Evolution of Cooperation , 1984 .
[18] Jörg Ott,et al. Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.
[19] Lars C. Wolf,et al. Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[20] Yin Zhang,et al. Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.
[21] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[22] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.