1 |
Qiao, Yan, et al., "Anomaly intrusion detection method based on HMM," Electronics Letters, Vol.38, No.13, pp.663-664, 2002.
DOI
|
2 |
Chaum, David, and Eugene Van Heyst, "Group signatures," Advances in Cryptology-EUROCRYPT'91. Springer Berlin Heidelberg, 1991.
|
3 |
Guo, Jinhua, John P. Baugh, and Shengquan Wang, "A group signature based secure and privacy-preserving vehicular communication framework," Mobile Networking for Vehicular Environments 2007, pp.103-108, 2007.
|
4 |
Olariu, Stephan, Ismail Khalil, and Mahmoud Abuelela, "Taking VANET to the clouds," International Journal of Pervasive Computing and Communications, Vol.7, No.1, pp.7-21, 2011.
DOI
|
5 |
El Zarki, Magda, et al., "Security issues in a future vehicular network," European Wireless, Vol.2, 2002.
|
6 |
Rivest, Ronald L., Adi Shamir, and Len Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978.
DOI
ScienceOn
|
7 |
Armbrust, Michael, et al., "A view of cloud computing," Communications of the ACM, Vol.53, No.4, pp.50-58, 2010.
|
8 |
Olariu, Stephan, Tihomir Hristov, and Gongjun Yan, "The next paradigm shift: from vehicular networks to vehicular clouds," Basagni, S., Conti, M., and Giordano, S. Stojmenovic, I) (Eds), "Mobile Ad hoc networking: the cutting edge directions," Wiley and Sons, New York, 2012.
|
9 |
Hussain, Rasheed, et al., "Rethinking vehicular communications: merging VANET with cloud computing," Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on. IEEE, 2012.
|
10 |
Popek, Gerald J., Robert P. Goldberg, "Formal requirements for virtualizable third generation architectures," Communications of the ACM, Vol.17, No.7, pp.412-421, 1974.
DOI
ScienceOn
|
11 |
Su, William, Sung-Ju Lee, and Mario Gerla, "Mobility prediction and routing in ad hoc wireless networks," International Journal of Network Management, Vol.11, No.1, pp.3-30, 2001.
DOI
ScienceOn
|
12 |
Noureddine, Hadi, et al., "A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks," Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010.
|
13 |
Rowland, Craig H., "Intrusion detection system," U.S. Patent, No.6, 405,318., 11 Jun., 2002.
|
14 |
Modi, Chirag, et al., "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, Vol.36, No.1, pp.42-57, 2013.
DOI
|