4.7 Article

Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Trust-based security routing mechanism in mobile social networks

Shuang Yang et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V. Gomathy et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Computer Science, Information Systems

MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles

Farhan Ahmad et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network

Zhe Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Learning-Aided Computation Offloading for Trusted Collaborative Mobile Edge Computing

Yuqing Li et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Proceedings Paper Computer Science, Information Systems

Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms

Shanshan Sun et al.

2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020) (2020)

Article Computer Science, Theory & Methods

Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks

Xiang Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Civil

Online Map Matching With Route Prediction

Shun Taguchi et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Engineering, Civil

A Study of the Effectiveness of Message Content, Length, and Rate Control for Improving Map Accuracy in Automated Driving Systems

S. M. Osman Gani et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Engineering, Civil

An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks

Jie Cui et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Engineering, Civil

New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks

Degan Zhang et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Computer Science, Theory & Methods

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liang Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs

Wael Alghamdi et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2019)

Article Computer Science, Information Systems

A Secure and Privacy Preserving Partial Deterministic RWP Model to Reduce Overlapping in IoT Sensing Environment

A. S. M. Sanwar Hosen et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Cluster-Based Content Distribution Integrating LTE and IEEE 802.11p with Fuzzy Logic and Q-Learning

Celimuge Wu et al.

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2018)

Article Engineering, Civil

Shapely Value Perspective on Adapting Transmit Power for Periodic Vehicular Communications

Syed Adeel Ali Shah et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges

Cheng Huang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

Security and Privacy in Fog Computing: Challenges

Mithun Mukherjee et al.

IEEE ACCESS (2017)

Article Engineering, Electrical & Electronic

Countering Intelligent-Dependent Malicious Nodes in Target Detection Wireless Sensor Networks

Saud Althunibat et al.

IEEE SENSORS JOURNAL (2016)

Article Computer Science, Information Systems

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Ruilong Deng et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Information Systems

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

Jian-Ming Chang et al.

IEEE SYSTEMS JOURNAL (2015)

Article Automation & Control Systems

Group Pattern Mining Algorithm of Moving Objects' Uncertain Trajectories

Shuang Wang et al.

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (2015)

Article Computer Science, Theory & Methods

A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks

Haojin Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Engineering, Electrical & Electronic

Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques

Aditya Vempaty et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2013)

Article Computer Science, Information Systems

Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks

Ameneh Daeinabi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2013)

Article Computer Science, Information Systems

Probabilistic Nearest Neighbor Queries on Uncertain Moving Object Trajectories

Johannes Niedermayer et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2013)

Article Computer Science, Information Systems

Distributed detection of mobile malicious node attacks in wireless sensor networks

Jun-Won Ho et al.

AD HOC NETWORKS (2012)

Article Engineering, Electrical & Electronic

A Reputation-Based Announcement Scheme for VANETs

Qin Li et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Proceedings Paper Computer Science, Theory & Methods

Querying Uncertain Spatio-Temporal Data

Tobias Emrich et al.

2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE) (2012)

Article Engineering, Electrical & Electronic

A Distributed Key Management Framework with Cooperative Message Authentication in VANETs

Yong Hao et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)

Article Computer Science, Artificial Intelligence

Clustering uncertain trajectories

Nikos Pelekis et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2011)

Article Engineering, Electrical & Electronic

Communication Patterns in VANETs

Elmar Schoch et al.

IEEE COMMUNICATIONS MAGAZINE (2008)

Article Computer Science, Information Systems

INTER-VEHICLE COMMUNICATION SYSTEMS: A SURVEY

Mihail L. Sichitiu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)