Related references
Note: Only part of the references are listed.Joint use of DSRC and C-V2X for V2X communications in the 5.9 GHz ITS band
Keyvan Ansari
IET INTELLIGENT TRANSPORT SYSTEMS (2021)
A data-driven method for falsified vehicle trajectory identification by anomaly detection
Shihong Ed Huang et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2021)
Security issues and challenges in V2X: A Survey
Amrita Ghosal et al.
COMPUTER NETWORKS (2020)
Modeling and analyzing cyberattack effects on connected automated vehicular platoons
Pengcheng Wang et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2020)
Implications of traffic signal cybersecurity on potential deliberate traffic disruptions
Kenneth A. Perrine et al.
TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE (2019)
Resilience in Intelligent Transportation Systems (ITS)
Alexander A. Ganin et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2019)
Traffic signal control by leveraging Cooperative Adaptive Cruise Control (CACC) vehicle platooning capabilities
Hao Liu et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2019)
Joint optimization of vehicle trajectories and intersection controllers with connected automated vehicles: Combined dynamic programming and shooting heuristic approach
Yi Guo et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2019)
Delay-Based Traffic Signal Control for Throughput Optimality and Fairness at an Isolated Intersection
Jian Wu et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
Integrated optimization of traffic signals and vehicle trajectories at isolated urban intersections
Chunhui Yu et al.
TRANSPORTATION RESEARCH PART B-METHODOLOGICAL (2018)
Spatiotemporal intersection control in a connected and automated vehicle environment
Yiheng Feng et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2018)
Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data
Yiheng Feng et al.
TRANSPORTATION RESEARCH RECORD (2018)
Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet
Joseph M. Ernst et al.
TRANSPORTATION RESEARCH RECORD (2017)
Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security
Jack Reilly et al.
TRANSPORTATION RESEARCH PART B-METHODOLOGICAL (2016)
A real-time adaptive signal control in a connected vehicle environment
Yiheng Feng et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2015)
Signal control optimization for automated vehicles at isolated signalized intersections
Zhuofei Li et al.
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2014)
Cumulative Travel-Time Responsive Real-Time Intersection Control Algorithm in the Connected Vehicle Environment
Joyoung Lee et al.
JOURNAL OF TRANSPORTATION ENGINEERING (2013)
Computer security in the real world
BW Lampson
COMPUTER (2004)
A simplified car-following theory: a lower order model
GF Newell
TRANSPORTATION RESEARCH PART B-METHODOLOGICAL (2002)