Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping
暂无分享,去创建一个
Mingchu Li | Cheng Guo | Yingmo Jie | Ling Chen | Mingchu Li | Cheng Guo | Yingmo Jie | Ling Chen
[1] Lei Guo,et al. Temporal, Functional and Spatial Big Data Computing Framework for Large-Scale Smart Grid , 2019, IEEE Transactions on Emerging Topics in Computing.
[2] Warnakulasuriya Anil Chandana Fernando,et al. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).
[3] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[4] Hsiao-Hwa Chen,et al. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.
[5] E. Candès. The restricted isometry property and its implications for compressed sensing , 2008 .
[6] Joel A. Tropp,et al. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.
[7] MengChu Zhou,et al. A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.
[8] Tarek Saadawi,et al. DoS attack detection in Internet-connected vehicles , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[9] Radhika M. Pai,et al. Mitigation of insider and outsider DoS attack against signature based authentication in VANETs , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).
[10] Feng Xia,et al. Green and Sustainable Cloud of Things: Enabling Collaborative Edge Computing , 2019, IEEE Communications Magazine.
[11] Yue-Bin Luo,et al. Effectiveness of Port Hopping as a Moving Target Defense , 2014, 2014 7th International Conference on Security Technology.
[12] Balas K. Natarajan,et al. Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..
[13] Kim-Kwang Raymond Choo,et al. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.
[14] P. Vasudeva Reddy,et al. Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks , 2018, IEEE Access.
[15] H.C.J. Lee,et al. Port hopping for resilient networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[16] Lei Guo,et al. Quick Answer for Big Data in Sharing Economy: Innovative Computer Architecture Design Facilitating Optimal Service-Demand Matching , 2018, IEEE Transactions on Automation Science and Engineering.
[17] Joel A. Tropp,et al. Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.
[18] Vijay Sivaraman,et al. Smart IoT Devices in the Home: Security and Privacy Implications , 2018, IEEE Technology and Society Magazine.
[19] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[20] Lei Wang,et al. Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System , 2018, IEEE Transactions on Industrial Informatics.
[21] MengChu Zhou,et al. A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[22] Dong Hoon Lee,et al. Reliable Cooperative Authentication for Vehicular Networks , 2018, IEEE Transactions on Intelligent Transportation Systems.
[23] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[24] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[25] Pierluigi Pisu,et al. Resilient control strategy under Denial of Service in connected vehicles , 2017, 2017 American Control Conference (ACC).
[26] Xue Chen,et al. Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption , 2020, IEEE Transactions on Services Computing.
[27] Jianfeng Ma,et al. A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs , 2017, IEEE Access.
[28] Bogdan Groza,et al. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks , 2018, IEEE Vehicular Technology Magazine.
[29] Simin Nadjm-Tehrani,et al. Attitudes and Perceptions of IoT Security in Critical Societal Services , 2016, IEEE Access.
[30] Jun Huang,et al. Vehicular Fog Computing: Enabling Real-Time Traffic Management for Smart Cities , 2019, IEEE Wireless Communications.
[31] Kaishun Wang,et al. Singular linear space and its applications , 2011, Finite Fields Their Appl..
[32] Kim-Kwang Raymond Choo,et al. Secure Range Search Over Encrypted Uncertain IoT Outsourced Data , 2019, IEEE Internet of Things Journal.
[33] Neera Batra,et al. Prevention of denial of service attack over vehicle ad hoc networks using quick response table , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).
[34] Cheng Guo,et al. Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage , 2017, 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC).
[35] Xiangjie Kong,et al. A Social-Aware Group Formation Framework for Information Diffusion in Narrowband Internet of Things , 2018, IEEE Internet of Things Journal.
[36] Wei Hu,et al. RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks , 2017, IEICE Trans. Inf. Syst..
[37] 张连成,et al. A Port Hopping Based DoS Mitigation Scheme in SDN Network , 2016 .
[38] Stephen J. Dilworth,et al. Explicit constructions of RIP matrices and related problems , 2010, ArXiv.