Detecting faulty and malicious vehicles using rule-based communications data mining
暂无分享,去创建一个
[1] Andreas Meier,et al. Design of 5.9 ghz dsrc-based vehicular safety communication , 2006, IEEE Wireless Communications.
[2] Eliahu Khalastchi,et al. Detecting anomalies in unmanned vehicles using the Mahalanobis distance , 2010, 2010 IEEE International Conference on Robotics and Automation.
[3] Gösta Grahne,et al. Efficiently Using Prefix-trees in Mining Frequent Itemsets , 2003, FIMI.
[4] Soumaya Cherkaoui,et al. A secure service architecture to support wireless vehicular networks , 2010, Int. J. Auton. Adapt. Commun. Syst..
[5] Peng Ning,et al. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[6] Nalini Venkatasubramanian,et al. Security Issues in a Future Vehicular Network , 2002 .
[7] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[8] Nicolas Pasquier,et al. Efficient Mining of Association Rules Using Closed Itemset Lattices , 1999, Inf. Syst..
[9] Soumaya Cherkaoui,et al. Deterministic access for DSRC/802.11p vehicular safety communication , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[10] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[11] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[12] Osmar R. Zaïane,et al. Incremental mining of frequent patterns without candidate generation or support constraint , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..
[13] Tim Moors,et al. Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA) , 2008, 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008).
[14] Ahmed E. Kamal,et al. Network Coding-Based Protection of Many-to-One Flow Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[15] Sadok Ben Yahia,et al. A Divide and Conquer Approach for Deriving Partially Ordered Sub-structures , 2005, PAKDD.
[16] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD '00.
[17] Ben Kao,et al. Online Algorithms for Mining Inter-stream Associations from Large Sensor Networks , 2005, PAKDD.
[18] Hariharan Krishnan,et al. Adaptive intervehicle communication control for cooperative safety systems , 2010, IEEE Network.
[19] BoukercheAzzedine,et al. A Novel Algorithm for Mining Association Rules in Wireless Ad Hoc Sensor Networks , 2008 .