3.8 Proceedings Paper

Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game

Omar Abdel Wahab et al.

Summary: This research proposes a repeated Bayesian Stackelberg game to address multi-type attacks in cloud-based systems. Through risk assessment, live-migration-based defense mechanism, machine-learning technology, and resource-aware Bayesian Stackelberg game, the detection of attacks is maximized.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game

Talal Halabi et al.

Summary: This article explores novel ways to launch intelligent attacks through connected vehicles, aiming to minimize the impact on road traffic services with optimal strategies. By modeling the processes of attack and defense, the article proposes solutions to address data corruption attacks and enhance the security of IoV.

IEEE TRANSACTIONS ON RELIABILITY (2021)

Article Engineering, Electrical & Electronic

Simulation Framework for Misbehavior Detection in Vehicular Networks

Joseph Kamel et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Chemistry, Multidisciplinary

A New Proposal on the Advanced Persistent Threat: A Survey

Santiago Quintero-Bonilla et al.

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Hardware & Architecture

Cyber Security Game for Intelligent Transportation Systems

Hichem Sedjelmaci et al.

IEEE NETWORK (2019)

Article Computer Science, Information Systems

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems

Rens Wouter van der Heijden et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities

Adel Alshamrani et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Multidisciplinary Sciences

Defending Against Advanced Persistent Threats Using Game-Theory

Stefan Rass et al.

PLOS ONE (2017)

Proceedings Paper Computer Science, Hardware & Architecture

A Comprehensive Study of Intelligent Transportation System Architectures for Road Congestion Avoidance

Sara El Hamdani et al.

UBIQUITOUS NETWORKING, UNET 2017 (2017)

Article Engineering, Electrical & Electronic

Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection

Kamran Zaidi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Proceedings Paper Computer Science, Theory & Methods

Systems for Detecting Advanced Persistent Threats a Development Roadmap using Intelligent Data Analysis

Johannes de Vries et al.

2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY) (2012)

Article Engineering, Electrical & Electronic

Dedicated Short-Range Communications (DSRC) Standards in the United States

John B. Kenney

PROCEEDINGS OF THE IEEE (2011)