1 |
Papadimitratos, P., Gligor, V. and Hubaux, J. P. (2006). Securing vehicluar communications - assumptions, requirements and principles. Proceeding of the workshop on Embedded Security in Cars, 5-14.
|
2 |
Park, S., Aslam, B., Turgut, D. and Zou, C. C. (2009). Defence against sybil attack in vehicular ad hoc network based on roadside unit support. Proceedings of Military Communications Conference, 1-7.
|
3 |
Raya, M., Manshaei, M. H., Felegyhazi, M. and Hubaux, J. P. (2008). Revocation games in ephemeral networks. Procedings of ACM Computer and Communications Security, 199-210.
|
4 |
Raya, M., Papadimitratos, P., Aad, I., Jungels, D. and Hubaux, J. P. (2007). Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications, 25, 1557-1568.
DOI
|
5 |
Ruj, S., Cavenaghi, M. A., Huang, Z., Nayak, A., and Stojmenovic, I. (2011). On data-centric misbehavior detection in vanets. Proceeding of Vehicular Technology Conference.
|
6 |
Shen, Q. and Jensen, R (2007). Rough sets, their extensions and applications. International Journal of Automation and Computing, 4, 217-228.
DOI
ScienceOn
|
7 |
The CAMP Vehicle Safety Communications Consortium. (2005) Vehicle safety communications project, task 3 final report.
|
8 |
Zhou, T., Choudhury, R. R., Ning, P. and Chakrabarty, K. (2007). Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. Proceeding of Mobile and Ubiquitous Systems: Networking & Services, 1-8.
|
9 |
배인한 (2010). 모바일 애드-혹 망을 위한 퍼지 비정상 행위 탐지 알고리즘. <한국데이터정보과학회지>, 21, 1125-1136.
|
10 |
이소연 (2008). 차내망 인터페이스. , 117, 114-117.
|
11 |
오현서, 박종현 (2008). 차량 통신 네트워크 기술 동향. <전자통신동향분석>, 23, 49-55.
|
12 |
Bilogrevic, I., Manshaei, M., Raya, M. and Hubaux, J. P. (2010). Optimal revocations in ephemeral networks: A gametheoretic framework. Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 184-193.
|
13 |
Douceur, J. R. (2002). The sybil attack. Proceeding of the First International Workshop on Peer-to-Peer Systems, 251-260.
|
14 |
Ghosh M., Varghese, A., Gupta, A., Kherani A. A. and Muthaiah, S. N. (2010). Detecting misbehaviors in vanet with integrated root-cause analysis. Journal of Ad Hoc Networks, 8, 778-790.
DOI
ScienceOn
|
15 |
Golle, P., Greene, D. and Staddon J. (2009). Detecting and correcting malicious data in vanets. Proceedings of Vehicular Ad Hoc Networks, 29-37.
|
16 |
Hiraoka, T., Tanaka, M., Takeuchi, S., Kumamoto, H., Isumi, T. and Hatanaka, K. (2009). Collision risk evaluation index based on deceleration for collision avoidance (second report). Review of Automotive Engineering, 30, 439-447.
|
17 |
Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Andeson, R. and Hubaux, J. P. (2008). Fast exclusion of errant devices from vehicular networks. Proceeding of Sensor, Mesh and Ad Hoc Communications and Networks, 21, 135-143.
|