-
1
-
-
84892911808
-
Security of vehicular ad hoc networks in intelligent transportation systems
-
Y. Z. Ming-Tuo Zhou, Laurence T. Yang, Ed., ed: Nova Publishers
-
Z. Li, Z. Wang, and C. Chigan, "Security of vehicular ad hoc networks in intelligent transportation systems," in Wireless Technologies in Intelligent Transportation Systems, Y. Z. Ming-Tuo Zhou, Laurence T. Yang, Ed., ed: Nova Publishers, 2011, pp. 133-174.
-
(2011)
Wireless Technologies in Intelligent Transportation Systems
, pp. 133-174
-
-
Li, Z.1
Wang, Z.2
Chigan, C.3
-
2
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
Dec.
-
K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," Acm Computing Surveys, vol. 42, Dec 2009.
-
(2009)
Acm Computing Surveys
, vol.42
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
5
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "AMOEBA: Robust location privacy scheme for VANET," IEEE Journal on Selected Areas in Communications, vol. 25, pp. 1569-1589, 2007.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
7
-
-
84855713970
-
Vehicle behavior analysis to enhance security in vanets
-
R. K. Schmidt, T. Leinmüller, E. Schoch, A. Held, and G. Schäfer, "Vehicle behavior analysis to enhance security in vanets," in Proc. 4th Workshop on Vehicle to Vehicle Communications, 2008.
-
(2008)
Proc. 4th Workshop on Vehicle to Vehicle Communications
-
-
Schmidt, R.K.1
Leinmüller, T.2
Schoch, E.3
Held, A.4
Schäfer, G.5
-
8
-
-
79959208028
-
RAMV: Ensuring resource-aware message verification in VANETs
-
Jul.
-
Z. Li and C. Chigan, "RAMV: ensuring resource-aware message verification in VANETs," Security and Communication Networks, vol. 4, pp. 771-784, Jul 2011.
-
(2011)
Security and Communication Networks
, vol.4
, pp. 771-784
-
-
Li, Z.1
Chigan, C.2
-
9
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM 2006, 2006, pp. 1-13.
-
(2006)
Proc. IEEE INFOCOM 2006
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
10
-
-
34250782069
-
A Bayesian network based trust model for improving collaboration in mobile ad hoc networks
-
C. T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," in Proc. 2007 IEEE International Conference on Research, Innovation and Vision for the Future, 2007, pp. 144-151.
-
(2007)
Proc. 2007 IEEE International Conference on Research, Innovation and Vision for the Future
, pp. 144-151
-
-
Nguyen, C.T.1
Camp, O.2
Loiseau, S.3
-
12
-
-
38049020981
-
Probabilistic isolation of malicious vehicles in pseudonym changing VANETs
-
B. Liu, Y. Zhong, and S. Zhang, "Probabilistic isolation of malicious vehicles in pseudonym changing VANETs," in Proc. 7th IEEE International Conference on Computer and Information Technology, 2007., 2007, pp. 967-972.
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology, 2007
, pp. 967-972
-
-
Liu, B.1
Zhong, Y.2
Zhang, S.3
-
15
-
-
79957593169
-
-
September 02
-
ISI. (2011, September 02). The Network Simulator - ns-2. Available: http://www.isi.edu/nsnam/ns/index.html
-
(2011)
The Network Simulator - ns-2
-
-
|