1 |
C. Guizani and A. Al-Fuqaha, "Constructing an Efficient Mobility Profile of Ad-Hoc for Mobility-Pattern-Based Anomaly Detection in MANET," GLOBECOM'2006, pp. 1-5, 2006.
|
2 |
A. Boukerche, H. A. Oliveria, E. F. Nakamura, A. A. Loureiro, "Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems, Computer Communications, Vol. 31, pp. 2838-2849, 2008.
DOI
ScienceOn
|
3 |
W. Franz, C. Wagner, C. Maihoefer, and H. Hartenstein, "Fleetnet: Plat-form for inter-vehicle communications," in 1th International Workshop on Intelligent Transportation, Hamburg, Germany, 2004.
|
4 |
S. J. Oh, "An Anomaly Detection Method for the Security of VANETs", Journal of the Institute of Webcasting, Internet and Telecommunication, Vol. 10, No. 2, pp. 77-84, 2010.
과학기술학회마을
|
5 |
B. Chen, L. Fu and D. Liu, "Efficient Anomaly Monitoring over Moving Object Trajectory Streams", KDD'2009, pp. 159-167, 2009.
|
6 |
H. Deng et al., "Agent-based Distributed Intrusion Detection Methodology for MANETs," Proc. of the 2006 International Conference on Security & Management, pp. 200-206, 2006.
|
7 |
S. J. Oh, "Design and Evaluation of a Weighted Intrusion Detection Method for VANETs", Journal of the Institute of Webcasting, Internet and Telecommunication, Vol. 11, No. 3, pp. 181-188, 2011
과학기술학회마을
|
8 |
H. Wickham, "The Split-Apply-Combine Strategy for Big Data Analysis. Journal of Statistical Software, Vol. 40, No. 1, pp. 1-29, 2011.
|