A game theory based multi layered intrusion detection framework for VANET
暂无分享,去创建一个
[1] Soumaya Cherkaoui,et al. An AAA Study for Service Provisioning in Vehicular Networks , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[2] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[3] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[4] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[5] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[6] Muhammad Imran,et al. A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..
[7] Ahmad Khademzadeh,et al. VWCA: An efficient clustering algorithm in vehicular ad hoc networks , 2011, J. Netw. Comput. Appl..
[8] Thar Baker,et al. Measurement and Classification of Smart Systems Data Traffic Over 5G Mobile Networks , 2018 .
[9] Yvon Gourhant,et al. AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture , 2005, VANET '05.
[10] Thar Baker,et al. Comparison Data Traffic Scheduling Techniques for Classifying QoS over 5G Mobile Networks , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[11] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[12] Lorena González-Manzano,et al. Security Models in Vehicular Ad-hoc Networks: A Survey , 2014 .
[13] Xiaodong Lin,et al. Security in service-oriented vehicular networks , 2009, IEEE Wirel. Commun..
[14] Daniel Krajzewicz,et al. Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .
[15] Hannes Federrath,et al. REST-Net: A dynamic rule-based IDS for VANETs , 2014, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC).
[16] Md. Rafiqul Islam,et al. Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..
[17] Guillermo Acosta-Marum,et al. Wave: A tutorial , 2009, IEEE Communications Magazine.
[18] Anis Laouiti,et al. Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.
[19] Farrukh Aslam Khan,et al. Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[20] Naveen K. Chilamkurti,et al. Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..
[21] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[22] Xiaohong Li,et al. MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks , 2017, Future Gener. Comput. Syst..
[23] M. G. Sumithra,et al. An enhanced intrusion detection system for routing attacks in MANET , 2013, 2013 International Conference on Advanced Computing and Communication Systems.
[24] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[25] Turgay Korkmaz,et al. HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[26] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[27] Thar Baker,et al. Data Traffic Model in Machine to Machine Communications over 5G Network Slicing , 2016, 2016 9th International Conference on Developments in eSystems Engineering (DeSE).
[28] Luca Delgrossi,et al. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[29] Amir Qayyum,et al. A Survey on Security in Vehicular Ad Hoc Networks , 2013, Nets4Cars/Nets4Trains.
[30] Dan Feng,et al. Unifying intrusion detection and forensic analysis via provenance awareness , 2016, Future Gener. Comput. Syst..
[31] Sushanta Karmakar,et al. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .
[32] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[33] Frank Kargl,et al. Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[34] Charlie Yong-Sang Shim,et al. A taxonomy for DOS attacks in VANET , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).
[35] Frank Kargl,et al. Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.
[36] Ali Movaghar,et al. A novel approach for avoiding wormhole attacks in VANET , 2009, 2009 First Asian Himalayas International Conference on Internet.
[37] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[38] Lars C. Wolf,et al. Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).