Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
暂无分享,去创建一个
Rida Khatoun | Ahmed Serhrouchni | Youcef Begriche | Pengwenlong Gu | A. Serhrouchni | R. Khatoun | Y. Begriche | Pengwenlong Gu | Rida Khatoun
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[3] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[4] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[5] Peng Ning,et al. P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[6] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[7] Florian Dotzer,et al. Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[8] Rida Khatoun,et al. Decentralized Alerts Correlation Approach for DDoS Intrusion Detection , 2008, 2008 New Technologies, Mobility and Security.
[9] Mohamed F. Younis,et al. Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs , 2015, 2015 IEEE International Conference on Communications (ICC).
[10] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[11] Jun Gao,et al. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.
[12] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[13] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[14] Jizhong Zhao,et al. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Weihua Zhuang,et al. Stochastic Analysis of a Single-Hop Communication Link in Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Intelligent Transportation Systems.
[16] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[17] Yu Cheng,et al. Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[18] Bu-Sung Lee,et al. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.
[19] Shihao Yan,et al. Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.
[20] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[21] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .