-
1
-
-
84873898187
-
A framework for secure and efficient data acquisition in vehicular ad hoc networks
-
Feb.
-
K. Mershad and H. Artail, "A framework for secure and efficient data acquisition in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 536-551, Feb. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.2
, pp. 536-551
-
-
Mershad, K.1
Artail, H.2
-
2
-
-
70350330400
-
Security in service-oriented vehicular networks
-
Oct.
-
H. Zhu, R. Lu, X. Shen, and X. Lin, "Security in service-oriented vehicular networks, " IEEE Wireless Commun., vol. 16, no. 4, pp. 16-22, Oct. 2009.
-
(2009)
IEEE Wireless Commun.
, vol.16
, Issue.4
, pp. 16-22
-
-
Zhu, H.1
Lu, R.2
Shen, X.3
Lin, X.4
-
3
-
-
84919471140
-
Defending connected vehicles against malware: Challenges and a solution framework
-
Feb.
-
T. Zhang, H. Antunes, and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework, " IEEE Internet Things J., vol. 1, no. 1, pp. 10-21, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 10-21
-
-
Zhang, T.1
Antunes, H.2
Aggarwal, S.3
-
4
-
-
84884725370
-
An efficient intrusion detection framework in cluster-based wireless sensor networks
-
H. Sedjelmaci, S. M. Senouci, and M. Feham, "An efficient intrusion detection framework in cluster-based wireless sensor networks, " Secur. Commun. Netw., vol. 6, no. 10, pp. 1211-1224, 2013.
-
(2013)
Secur. Commun. Netw.
, vol.6
, Issue.10
, pp. 1211-1224
-
-
Sedjelmaci, H.1
Senouci, S.M.2
Feham, M.3
-
5
-
-
78649326285
-
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
-
A. Daeinabi, A. G. P. Rahbar, and A. Khademzadeh, "VWCA: An efficient clustering algorithm in vehicular ad hoc networks, " J. Netw. Comput. Appl., vol. 34, no. 1, pp. 207-222, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 207-222
-
-
Daeinabi, A.1
Rahbar, A.G.P.2
Khademzadeh, A.3
-
6
-
-
35348977820
-
Eviction of misbehaving and faulty nodes in vehicular networks
-
Oct.
-
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks, " IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.8
, pp. 1557-1568
-
-
Raya, M.1
Papadimitratos, P.2
Aad, I.3
Jungels, D.4
Hubaux, J.-P.5
-
7
-
-
83755171614
-
On data-centric misbehavior detection in VANETs
-
San Francisco, CA, USA
-
S. Ruj, M. A. Cavenaghi, Z. Huang, A. Nayak, and I. Stojmenovic, "On data-centric misbehavior detection in VANETs, " in Proc. IEEE Veh. Technol. Conf. (VTC Fall), San Francisco, CA, USA, 2011, pp. 1-5.
-
(2011)
Proc. IEEE Veh. Technol. Conf. (VTC Fall)
, pp. 1-5
-
-
Ruj, S.1
Cavenaghi, M.A.2
Huang, Z.3
Nayak, A.4
Stojmenovic, I.5
-
8
-
-
84906058894
-
Collaborative trust aware intelligent intrusion detection in VANETs
-
N. Kumar and N. Chilamkurti, "Collaborative trust aware intelligent intrusion detection in VANETs, " Comput. Elect. Eng., vol. 40, no. 6, pp. 1981-1996, 2014.
-
(2014)
Comput. Elect. Eng.
, vol.40
, Issue.6
, pp. 1981-1996
-
-
Kumar, N.1
Chilamkurti, N.2
-
9
-
-
62949186729
-
Service discovery, and service access in wireless vehicular networks
-
New Orlean, LA, USA
-
E. Coronado and S. Cherkaoui, "Service discovery, and service access in wireless vehicular networks, " in Proc. SUPE Workshop IEEE Globecom, New Orlean, LA, USA, 2008, pp. 1-6.
-
(2008)
Proc. SUPE Workshop IEEE Globecom
, pp. 1-6
-
-
Coronado, E.1
Cherkaoui, S.2
-
10
-
-
84875145945
-
Detecting Sybil attacks in VANETs
-
B. Yu, C. Z. Xua, and B. Xiao, "Detecting Sybil attacks in VANETs, " J. Parallel Distrib. Comput., vol. 73, pp. 746-756, 2013.
-
(2013)
J. Parallel Distrib. Comput.
, vol.73
, pp. 746-756
-
-
Yu, B.1
Xua, C.Z.2
Xiao, B.3
-
11
-
-
51449098979
-
Efficient identitybased batch verification scheme for vehicular sensor networks
-
Phoenix, AZ, USA
-
C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. ShenAn, "Efficient identitybased batch verification scheme for vehicular sensor networks, " in Proc. IEEE INFOCOM, Phoenix, AZ, USA, 2008, pp. 816-824.
-
(2008)
Proc. IEEE INFOCOM
, pp. 816-824
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.H.4
Shenan, X.5
-
13
-
-
77955771346
-
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis
-
Aug.
-
Z. Md. Fadlullah, T. Taleb, A. V. Vasilakos, M. Guizani, and N. Kato, "DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis, " IEEE/ACM Trans. Netw., vol. 18, no. 4, pp. 1234-1247, Aug. 2010.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.4
, pp. 1234-1247
-
-
Md. Fadlullah, Z.1
Taleb, T.2
Vasilakos, A.V.3
Guizani, M.4
Kato, N.5
-
14
-
-
84878111932
-
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks
-
M. Rondinone and J. Gozalvez, "Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks, " Comput. Netw., vol. 57, no. 8, pp. 1821-1837, 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.8
, pp. 1821-1837
-
-
Rondinone, M.1
Gozalvez, J.2
-
15
-
-
27544468419
-
LITEWORP: A lightweight countermeasure for the wormhole attack in multi hop wireless networks
-
Yokohama, Japan
-
I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: A lightweight countermeasure for the wormhole attack in multi hop wireless networks, " in Proc. IEEE Int. Conf. Depend. Syst. Netw., Yokohama, Japan, 2005, pp. 612-621.
-
(2005)
Proc. IEEE Int. Conf. Depend. Syst. Netw.
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
16
-
-
14944372809
-
Detecting and correcting malicious data in VANETs
-
Philadelphia, PA, USA
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETs, " in Proc. ACM Int. Workshop Veh. Ad Hoc Netw., Philadelphia, PA, USA, 2004, pp. 29-37.
-
(2004)
Proc. ACM Int. Workshop Veh. Ad Hoc Netw.
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
17
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
Berkley, CA, USA
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis & defenses, " in Proc. 3rd Int. Symp. Inf. Process. Sensor Netw., Berkley, CA, USA, 2004, pp. 259-268.
-
(2004)
Proc. 3rd Int. Symp. Inf. Process. Sensor Netw.
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
18
-
-
84893320007
-
Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks
-
Trento, Italy
-
H. Sedjelmaci and S. M. Senouci, "Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks, " in Proc. IEEE Global Inf. Infrastruct. Symp., Trento, Italy, 2013, pp. 1-6.
-
(2013)
Proc. IEEE Global Inf. Infrastruct. Symp.
, pp. 1-6
-
-
Sedjelmaci, H.1
Senouci, S.M.2
-
19
-
-
1542317849
-
Secure verification of location claims
-
San Diego, CA, USA
-
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims, " in Proc. ACM Workshop Wireless Secur. (WiSe), San Diego, CA, USA, 2003, pp. 1-10.
-
(2003)
Proc. ACM Workshop Wireless Secur. (WiSe)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
20
-
-
67650679815
-
Analysis of collision probability in vehicular ad hoc networks
-
Shanghai, China
-
J. An, X Guo, and Y Yang, "Analysis of collision probability in vehicular ad hoc networks, " in Proc. ACM Genet. Evol. Comput. (GEC'09), Shanghai, China, 2009, pp. 791-794.
-
(2009)
Proc. ACM Genet. Evol. Comput. (GEC'09)
, pp. 791-794
-
-
An, J.1
Guo, X.2
Yang, Y.3
-
21
-
-
84867627994
-
Evaluating workflow trust using hidden Markov modeling and provenance data
-
New York, NY, USA: Springer
-
M. Naseri and A. Simone, "Evaluating workflow trust using hidden Markov modeling and provenance data, " in Data Provenance and Data Management in eScience Studies in Computational Intelligence. New York, NY, USA: Springer, 2013, vol. 426, pp. 35-58.
-
(2013)
Data Provenance and Data Management in EScience Studies in Computational Intelligence
, vol.426
, pp. 35-58
-
-
Naseri, M.1
Simone, A.2
|