A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks
Yue Wu, Fanchao Meng, Guanghao Wang, Ping Yi
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Bayesian-based model for a reputation system in vehicular networks
Begriche, Youcef, Khatoun, Rida, Khoukhi, Lyes, Chen Xiuzhen
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
A reputation system for detection of black hole attack in vehicular networking
Khatoun, R., Gut, P., Doulami, R., Khoukhi, L., Serhrouchni, A.
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Secure Public Key Regime (SPKR) in vehicular networks
Tan Heng Chuan, Jun Zhang, Ma Maode, Chong, Peter Han Joo, Labiod, Houda
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Flooding attacks detection in MANETs
Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Gaiti, D.
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Classified security protection evaluation for vehicle information system
Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Security in MIMO wireless hybrid channel with artificial noise
Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Malicious URL prediction based on community detection
Zheng Li-xiong, Xu Xiao-lin, Li Jia, Zhang Lu, Pan Xuan-chen, Ma Zhi-yuan, Zhang Li-hong
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
A novel Fibonacci windows model for finding emerging patterns over online data stream
Akhriza, Tubagus M., Yinghua Ma, Jianhua Li
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding
Malicious data identification in smart grid based on residual error method
Zongshuai Hu, Yong Wang, Chunhua Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Published in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (01.08.2015)
Get full text
Conference Proceeding