-
1
-
-
84994185772
-
-
The evita project
-
The evita project. http://www.evita-project.org, 2008.
-
(2008)
-
-
-
2
-
-
84873949571
-
Assessment of node trustworthiness in vanets using data plausibility checks with particle filters
-
N. Bismeyer, S. Mauthofer, K. M. Bayarou, and F. Kargl. Assessment of node trustworthiness in vanets using data plausibility checks with particle filters. In IEEE VNC, 2012.
-
(2012)
IEEE VNC
-
-
Bismeyer, N.1
Mauthofer, S.2
Bayarou, K.M.3
Kargl, F.4
-
3
-
-
79951781925
-
Intrusion detection in vanets through verification of vehicle movement data
-
N. Bismeyer, C. Stresing, and K. Bayarou. Intrusion detection in vanets through verification of vehicle movement data. In IEEE VNC, 2010.
-
(2010)
IEEE VNC
-
-
Bismeyer, N.1
Stresing, C.2
Bayarou, K.3
-
6
-
-
32144446861
-
Security issues in a future vehicular network
-
M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security issues in a future vehicular network. European Wireless, 2, 2002.
-
(2002)
European Wireless
, vol.2
-
-
El Zarki, M.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
7
-
-
0141832923
-
A new traffic safety vision for the United States
-
L. Evans. A new traffic safety vision for the united states. American Journal of Public Health, 93(9):1384-1386, 2003.
-
(2003)
American Journal of Public Health
, vol.93
, Issue.9
, pp. 1384-1386
-
-
Evans, L.1
-
8
-
-
84964647233
-
Congestion attacks to autonomous cars using vehicular botnets
-
M. T. Garip, M. E. Gursoy, P. Reiher, and M. Gerla. Congestion attacks to autonomous cars using vehicular botnets. In NDSS, 2015.
-
(2015)
NDSS
-
-
Garip, M.T.1
Gursoy, M.E.2
Reiher, P.3
Gerla, M.4
-
9
-
-
78649265918
-
Detecting and correcting malicious data in vanets
-
P. Golle, D. Greene, and J. Staddon. Detecting and correcting malicious data in vanets. In ACM VANET, 2004.
-
(2004)
ACM VANET
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
11
-
-
3042594839
-
The security and privacy of smart vehicles
-
J. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security & Privacy, 2(3):49-55, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.1
Capkun, S.2
Luo, J.3
-
12
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
I. Roufa et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In 19th USENIX Security Symposium, 2010.
-
(2010)
19th USENIX Security Symposium
-
-
Roufa, I.1
-
15
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
T. Leinmuller, E. Schoch, and F. Kargl. Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5):16-21, 2006.
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmuller, T.1
Schoch, E.2
Kargl, F.3
-
16
-
-
84888995231
-
Beheading hydras: Performing effective botnet takedowns
-
Y. Nadji, M. Antonakakis, R. Perdisci, D. Dagon, and W. Lee. Beheading hydras: Performing effective botnet takedowns. In ACM SIGSAC Conference on Computer & Communications Security, 2013.
-
(2013)
ACM SIGSAC Conference on Computer & Communications Security
-
-
Nadji, Y.1
Antonakakis, M.2
Perdisci, R.3
Dagon, D.4
Lee, W.5
-
17
-
-
0031001058
-
Road traffic injuries in developing countries: A comprehensive review of epidemiological studies
-
May
-
W. Odero, P. Garner, and A. Zwi. Road traffic injuries in developing countries: a comprehensive review of epidemiological studies. Tropical Medicine & International Health, 2(5):445-460, May 1997.
-
(1997)
Tropical Medicine & International Health
, vol.2
, Issue.5
, pp. 445-460
-
-
Odero, W.1
Garner, P.2
Zwi, A.3
-
18
-
-
34247351261
-
Challenges in securing vehicular networks
-
B. Parno and A. Perrig. Challenges in securing vehicular networks. In ACM Hotnets IV, 2005.
-
(2005)
ACM Hotnets IV
-
-
Parno, B.1
Perrig, A.2
-
19
-
-
84857552847
-
Spoofed data detection in vanets using dynamic thresholds
-
J. Petit, M. Feiri, and F. Kargl. Spoofed data detection in vanets using dynamic thresholds. In IEEE VNC, 2011.
-
(2011)
IEEE VNC
-
-
Petit, J.1
Feiri, M.2
Kargl, F.3
-
20
-
-
84857534647
-
Vehicle behavior analysis to enhance security in vanets
-
R. K. Schmidt et al. Vehicle behavior analysis to enhance security in vanets. In IEEE V2VCOM, 2008.
-
(2008)
IEEE V2VCOM
-
-
Schmidt, R.K.1
-
23
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway et al. Comprehensive experimental analyses of automotive attack surfaces. In 20th USENIX Security Symposium, 2011.
-
(2011)
20th USENIX Security Symposium
-
-
Checkoway, S.1
-
26
-
-
84857611312
-
A two-stage verification process for car-to-x mobility data based on path prediction and probabilistic maneuver recognition
-
H. Stubing, J. Firl, and S. A. Huss. A two-stage verification process for car-to-x mobility data based on path prediction and probabilistic maneuver recognition. In IEEE VNC, 2011.
-
(2011)
IEEE VNC
-
-
Stubing, H.1
Firl, J.2
Huss, S.A.3
-
29
-
-
84994185247
-
-
UN Economic Commission for Europe
-
UN Economic Commission for Europe. UN vehicle regulations. http://www.unece.org/trans/main/wp29/wp29regs21-40.html, 2016.
-
(2016)
UN Vehicle Regulations
-
-
-
32
-
-
84966477020
-
Wireless access in vehicular environments
-
July
-
Wireless LAN Working Group. Wireless access in vehicular environments. IEEE Standards, July 2010.
-
(2010)
IEEE Standards
-
-
|