Detection of malicious vehicles with demerit and reward level system
暂无分享,去创建一个
[1] W. Marsden. I and J , 2012 .
[2] Soumaya Cherkaoui,et al. A secure service architecture to support wireless vehicular networks , 2010, Int. J. Auton. Adapt. Commun. Syst..
[3] Soumaya Cherkaoui,et al. Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[5] Tim Moors,et al. Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA) , 2008, 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008).
[6] V. Lakshmi Praba,et al. Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol , 2013 .
[7] Eliahu Khalastchi,et al. Detecting anomalies in unmanned vehicles using the Mahalanobis distance , 2010, 2010 IEEE International Conference on Robotics and Automation.
[8] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[9] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[10] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[11] Ben Kao,et al. Online Algorithms for Mining Inter-stream Associations from Large Sensor Networks , 2005, PAKDD.
[12] Gösta Grahne,et al. Efficiently Using Prefix-trees in Mining Frequent Itemsets , 2003, FIMI.
[13] Abdelhakim Hafid,et al. Setting up an extended perception in a vehicular network environment: A proof of concept , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[14] Nalini Venkatasubramanian,et al. Security Issues in a Future Vehicular Network , 2002 .
[15] Jihene Rezgui,et al. An Overview of the SCV Simulator for Vehicular Networks , 2017 .
[16] Syed Asad Hussain,et al. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..