Related references
Note: Only part of the references are listed.Trust-based security routing mechanism in mobile social networks
Shuang Yang et al.
NEURAL COMPUTING & APPLICATIONS (2020)
Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
V. Gomathy et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles
Farhan Ahmad et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network
Zhe Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Learning-Aided Computation Offloading for Trusted Collaborative Mobile Edge Computing
Yuqing Li et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)
Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms
Shanshan Sun et al.
2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020) (2020)
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks
Xiang Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Online Map Matching With Route Prediction
Shun Taguchi et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
A Study of the Effectiveness of Message Content, Length, and Rate Control for Improving Map Accuracy in Automated Driving Systems
S. M. Osman Gani et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Jie Cui et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Degan Zhang et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks
Liang Liu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs
Wael Alghamdi et al.
ACM TRANSACTIONS ON SENSOR NETWORKS (2019)
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks
Tai-Hoon Kim et al.
IEEE ACCESS (2019)
A Secure and Privacy Preserving Partial Deterministic RWP Model to Reduce Overlapping in IoT Sensing Environment
A. S. M. Sanwar Hosen et al.
IEEE ACCESS (2019)
Cluster-Based Content Distribution Integrating LTE and IEEE 802.11p with Fuzzy Logic and Q-Learning
Celimuge Wu et al.
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2018)
Shapely Value Perspective on Adapting Transmit Power for Periodic Vehicular Communications
Syed Adeel Ali Shah et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges
Cheng Huang et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Security and Privacy in Fog Computing: Challenges
Mithun Mukherjee et al.
IEEE ACCESS (2017)
Countering Intelligent-Dependent Malicious Nodes in Target Detection Wireless Sensor Networks
Saud Althunibat et al.
IEEE SENSORS JOURNAL (2016)
Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption
Ruilong Deng et al.
IEEE INTERNET OF THINGS JOURNAL (2016)
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
Jian-Ming Chang et al.
IEEE SYSTEMS JOURNAL (2015)
Group Pattern Mining Algorithm of Moving Objects' Uncertain Trajectories
Shuang Wang et al.
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (2015)
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
Haojin Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques
Aditya Vempaty et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2013)
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
Ameneh Daeinabi et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2013)
Probabilistic Nearest Neighbor Queries on Uncertain Moving Object Trajectories
Johannes Niedermayer et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2013)
Distributed detection of mobile malicious node attacks in wireless sensor networks
Jun-Won Ho et al.
AD HOC NETWORKS (2012)
A Reputation-Based Announcement Scheme for VANETs
Qin Li et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)
Querying Uncertain Spatio-Temporal Data
Tobias Emrich et al.
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE) (2012)
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Yong Hao et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)
Clustering uncertain trajectories
Nikos Pelekis et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2011)
Communication Patterns in VANETs
Elmar Schoch et al.
IEEE COMMUNICATIONS MAGAZINE (2008)
INTER-VEHICLE COMMUNICATION SYSTEMS: A SURVEY
Mihail L. Sichitiu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)