Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
101 | Kejun Liu, Jing Deng 0001, Pramod K. Varshney, Kashyap Balakrishnan |
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 6(5), pp. 536-550, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
routing misbehavior, node misbehavior, Mobile Ad Hoc Networks (MANETs), network security, Dynamic Source Routing (DSR) |
82 | Jean-Yves Le Boudec, Slavisa Sarafijanovic |
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioADIT ![In: Biologically Inspired Approaches to Advanced Information Technology, First International Workshop, BioADIT 2004, Lausanne, Switzerland, January 29-30, 2004. Revised Selected Papers, pp. 396-411, 2004, Springer, 3-540-23339-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
79 | Svetlana Radosavac, John S. Baras, Iordanis Koutsopoulos |
A framework for MAC protocol misbehavior detection in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005, pp. 33-42, 2005, ACM, 1-59593-142-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
minmax robust detection, protocol misbehavior, wireless networks, MAC layer |
74 | William Kozma, Loukas Lazos |
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 103-110, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
routing, ad hoc networks, bloom filter, misbehavior |
69 | Lei Guang, Chadi Assi |
Cross-Layer Cooperation to Handle MAC Misbehavior in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 219-222, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Pradeep Kyasanur, Nitin H. Vaidya |
Selfish MAC Layer Misbehavior in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 4(5), pp. 502-516, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Wireless communication, network monitoring, network-level security and protection, public networks |
61 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 72-81, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
56 | Slavisa Sarafijanovic, Jean-Yves Le Boudec |
An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004, pp. 342-356, 2004, Springer, 3-540-23097-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos |
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(4), pp. 19:1-19:28, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
min-max robust detection, protocol misbehavior, Wireless networks, MAC layer |
53 | Oscar F. Gonzalez, Michael P. Howarth, George Pavlou |
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWIC ![In: Wired/Wireless Internet Communications, 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007, Proceedings, pp. 302-314, 2007, Springer, 978-3-540-72694-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
misbehavior detection, mobile ad hoc network, packet forwarding |
53 | Mahdi Kefayati, Hamid R. Rabiee, Seyed Ghassem Miremadi, Ahmad Khonsari |
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 91-100, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MANET security, misbehavior resiliance, multipath routing |
52 | Yonglin Ren, Richard Werner Nelem Pazzi, Azzedine Boukerche |
Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2009, Kos Island, Greece, 15-19 June, 2009, pp. 1-8, 2009, IEEE Computer Society, 978-1-4244-4439-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 49-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 23-25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Marco Conti, Enrico Gregori, Gaia Maselli |
Towards Reliable Forwarding for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003, Proceedings, pp. 790-804, 2003, Springer, 3-540-20123-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Svetlana Radosavac, John S. Baras, George V. Moustakides |
Impact of optimal MAC layer attacks on the network layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 135-146, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
minmax robust detection, protocol misbehavior, Ad-hoc networks, cross-layer, MAC layer |
48 | Jeffrey C. Mogul |
Emergent (mis)behavior vs. complex software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pp. 293-304, 2006, ACM, 1-59593-322-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
emergent misbehavior, complex systems, emergent behavior |
44 | Bo Zhu 0001, Kui Ren 0001, Lingyu Wang 0001 |
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 358-363, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Alberto López Toledo, Xiaodong Wang 0001 |
Robust Detection of Selfish Misbehavior in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 25(6), pp. 1124-1134, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Ryszard Klempous, Jan Nikodem, Lukasz Radosz, Norbert Raus |
Adaptive Misbehavior Detection in Wireless Sensors Network Based on Local Community Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 26-29 March 2007, Tucson, Arizona, USA, pp. 153-160, 2007, IEEE Computer Society, 0-7695-2772-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Martin Drozda, Sven Schaust, Helena Szczerbicka |
AIS for misbehavior detection in wireless sensor networks: Performance and design principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore, pp. 3719-3726, 2007, IEEE, 978-1-4244-1339-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Sonja Buchegger, Cédric Tissières, Jean-Yves Le Boudec |
A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks -- How Much Can Watchdogs Really Do? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMCSA ![In: 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), 2-10 December 2004, Lake District National Park, UK, pp. 102-111, 2004, IEEE Computer Society, 0-7695-2258-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Pradeep Kyasanur, Nitin H. Vaidya |
Detection and Handling of MAC Layer Misbehavior in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2003 International Conference on Dependable Systems and Networks (DSN 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings, pp. 173-182, 2003, IEEE Computer Society, 0-7695-1952-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras |
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(2), pp. 605-617, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CUSUM, SPRT, intrusion detection, DOMINO, misbehavior, IEEE 802.11 MAC |
40 | Xin Liu, Neng Wang |
Anti-misbehavior System for Tor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 257-261, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
exit policies, antimisbehavior, Anonymity, Tor, misbehavior |
39 | Gunasekaran Raja, Vaidheyanathan Rhymend Uthariaraj, Uamapathy Yamini, Sudharsan Rajagopalan, Selvaraj Sujitha Priyadarshini |
A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 24(3), pp. 472-481, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
WLANs, contention, DCF, MAC layer, backoff |
39 | Wenjia Li, Anupam Joshi, Tim Finin |
Policy-Based Malicious Peer Detection in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 76-82, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | A. Dadhich, Anil K. Sarje, K. Garg |
A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 728-735, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Paul D. Ezhilchelvan, Santosh K. Shrivastava |
A Family of Trusted Third Party Based Fair-Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(4), pp. 273-286, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Trusted Third Party (TTP), crash tolerance, security, distributed systems, smartcards, Fair exchange |
39 | Franz Wotawa, Safeeullah Soomro |
Fault Localization Based on Abstract Dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2005, Bari, Italy, June 22-24, 2005, Proceedings, pp. 357-359, 2005, Springer, 3-540-26551-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Nauman Mazhar, Muddassar Farooq |
A sense of danger: dendritic cells inspired artificial immune system for manet security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 63-70, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
misbehavior detection, mobile ad hoc networks, self organization, artificial immune systems, dendritic cells |
35 | Lei Guang, Chadi Assi, Abderrahim Benslimane |
Modeling and analysis of predictable random backoff in selfish environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2006, Terromolinos, Spain, October 2-6, 2006, pp. 86-90, 2006, ACM, 1-59593-477-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
selfish misbehavior, ad hoc networks, medium access control |
35 | Lakshmi Santhanam, Nagesh Nandiraju, Younghwan Yoo, Dharma P. Agrawal |
Distributed Self-policing Architecture for Fostering Node Cooperation in Wireless Mesh Networks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings, pp. 147-158, 2006, Springer, 3-540-45174-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Node Misbehavior, Mesh networks, Selfish Nodes, Free riders |
31 | Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé |
Autonomic trust reasoning enables misbehavior detection in OLSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2006-2013, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, trust, management, detection |
31 | Nader Hatami |
Studying misbehavior in CSMA/CA Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PM2HW2N ![In: Proceedings of the 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, PM2HW2N 2008, Vancouver, British Columbia, Canada, October 31, 2008, pp. 145-150, 2008, ACM, 978-1-60558-239-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
game theory, Wireless LAN, medium access control, selfish behavior |
31 | Oscar F. Gonzalez, Michael P. Howarth, George Pavlou |
An Algorithm to Detect Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 813-816, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Men Long, Chwan-Hwa John Wu |
Defending against data forwarding misbehavior in sensor networks by quasimultipath technique: models and simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 387-394, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
security, wireless sensor network, performance evaluation, energy efficiency, multipath routing |
31 | Spyridon Vassilaras, Dimitrios Vogiatzis, Gregory S. Yovanof |
Misbehavior Detection in Clustered Ad-hoc Networks with Central Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 687-692, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Martin Drozda, Sven Schaust, Sebastian Schildt, Helena Szczerbicka |
An Error Propagation Algorithm for Ad Hoc Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 8th International Conference, ICARIS 2009, York, UK, August 9-12, 2009. Proceedings, pp. 260-273, 2009, Springer, 978-3-642-03245-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Henry Been-Lirn Duh, Vivian Hsueh-hua Chen |
Cheating Behaviors in Online Gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (12) ![In: Online Communities and Social Computing, Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 567-573, 2009, Springer, 978-3-642-02773-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Online game cheating, cheating frameworks, online game fairness |
26 | Szymon Szott, Marek Natkaniec, Roberto Canonico, Andrzej R. Pach |
Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 1356-1361, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Aydan R. Yumerefendi, Jeffrey S. Chase |
Strong accountability for network storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 3(3), pp. 11:1-11:33, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Accountable services, accountable storage, accountability |
26 | Mi Kyung Han, Brian Overstreet, Lili Qiu |
Greedy Receivers in IEEE 802.11 Hotspots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 471-480, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Greedy receiver, wireless LAN |
26 | Ruidong Li, Jie Li 0002, Peng Liu 0005, Hsiao-Hwa Chen |
An Objective Trust Management Framework for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 56-60, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Kun Wang, Meng Wu |
A Trust Approach for Node Cooperation in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 481-491, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Node cooperation, MANET (Ad Hoc), trust |
26 | Bo Zhu, Sanjeev Setia, Sushil Jajodia |
Providing witness anonymity in peer-to-peer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 6-16, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication |
26 | Philipp Obreiter, Birgitta König-Ries |
The Interactive Cooperation Tournament. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 463-466, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya V. Ravishankar, Dharmaiah Manjunath |
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 63, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Suk-Bok Lee, Yoon-Hwa Choi |
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 59-70, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
packet-dropping attacks, secure routing, sensor network security, reliable delivery |
26 | Eric Thibodeau, Mohamed Youssef, Alain C. Houle |
Investigating Manet Performance in a VOIP Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 920-923, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Joon Heo, Choong Seon Hong |
An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 470-476, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 496-501, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
22 | M. Tamer Refaei, Luiz A. DaSilva, Mohamed Eltoweissy, Tamer Nadeem |
Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 59(5), pp. 707-719, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
node misbehavior, ad hoc networks, adaptation, cooperation, Reputation management |
22 | Jinyuan Sun, Chi Zhang 0001, Yanchao Zhang, Yuguang Fang |
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 21(9), pp. 1227-1239, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Privacy, traceability, revocation, vehicular ad hoc network, pseudonym, identity-based cryptography, misbehavior |
22 | Wenjia Li, Anupam Joshi, Tim Finin |
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Data Management ![In: Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23-26 May 2010, pp. 85-94, 2010, IEEE Computer Society, 978-0-7695-4048-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Multi-dimensional trust, Security, Mobile Ad hoc Network, Misbehavior |
22 | Wenjia Li, James Parker, Anupam Joshi |
Security through Collaboration in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 696-714, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile ad hoc network, gossiping, outlier detection, misbehavior |
22 | Nauman Mazhar, Muddassar Farooq |
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 102-109, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptographic security, misbehavior detection, mobile ad hoc networks, self-organization, swarm intelligence |
18 | Enrique Mármol Campos, José Luis Hernández Ramos, Aurora González-Vidal, Gianmarco Baldini, Antonio F. Skarmeta |
Misbehavior detection in intelligent transportation systems based on federated learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 25, pp. 101127, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini, Jamal El Kafi |
A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Pervasive Comput. Commun. ![In: Int. J. Pervasive Comput. Commun. 20(2), pp. 240-261, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Chenchen Lv, Chaklam Cheong, Yue Cao 0002, Yu Wang, Omprakash Kaiwartya, Celimuge Wu |
Leveraging Geographic Information and Social Indicators for Misbehavior Detection in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 4411-4424, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Chun Wei Choo, Marco Meyer |
Information misbehavior: How organizations use information to deceive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Assoc. Inf. Sci. Technol. ![In: J. Assoc. Inf. Sci. Technol. 74(9), pp. 1081-1085, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jianxiang Qi, Ning Zheng 0001, Ming Xu 0001, Xiaodong Wang, Yunzhi Chen |
A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 76, pp. 103528, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Edy Kristianto, Po-Ching Lin, Ren-Hung Hwang |
Misbehavior detection system with semi-supervised federated learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Veh. Commun. ![In: Veh. Commun. 41, pp. 100597, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed Lamine Bouchouia, Houda Labiod, Ons Jelassi, Jean-Philippe Monteuuis, Wafa Ben Jaballah, Jonathan Petit, Zonghua Zhang |
A survey on misbehavior detection for connected and autonomous vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Veh. Commun. ![In: Veh. Commun. 41, pp. 100586, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Islam Samy, Xiao Han, Loukas Lazos, Ming Li 0003, Yong Xiao, Marwan Krunz |
Misbehavior Detection in Wi-Fi/LTE Coexistence Over Unlicensed Bands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 22(8), pp. 4773-4791, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Edivaldo Pastori Valentini, Geraldo Pereira Rocha Filho, Robson Eduardo De Grande, Caetano Mazzoni Ranieri, Lourenço Alves Pereira Júnior, Rodolfo Ipolito Meneguette |
A Novel Mechanism for Misbehavior Detection in Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 68113-68126, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rajendra Prasad Nayak, Srinivas Sethi, Sourav Kumar Bhoi, Kshira Sagar Sahoo, Anand Nayyar |
ML-MDS: Machine Learning based Misbehavior Detection System for Cognitive Software-defined Multimedia VANETs (CSDMV) in smart cities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(3), pp. 3931-3951, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ghani-Ur Rehman, Muhammad Inam Ul Haq, Muhammad Zubair 0007, Zafar Mahmood, Madhusudan Singh 0001, Dhananjay Singh 0001 |
Misbehavior of nodes in IoT based vehicular delay tolerant networks VDTNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(5), pp. 7841-7859, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xinyao Ding, Yan Wang 0027 |
Misbehavior Detection and Identification in DF Multi-Relay VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. Lett. ![In: IEEE Wirel. Commun. Lett. 12(2), pp. 222-226, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tejasvi Alladi, Varun Kohli, Vinay Chamola, F. Richard Yu |
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Commun. Networks ![In: Digit. Commun. Networks 9(5), pp. 1113-1122, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Abdelwahab Boualouache, Thomas Engel 0001 |
A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 25(2), pp. 1128-1172, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marvy Badr Monir Mansour |
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(8), pp. 101690, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anupma Sangwan, Anju Sangwan, Rishi Pal Singh |
A Classification of Misbehavior Detection Schemes for VANETs: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 129(1), pp. 285-322, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Opeyemi Ajibuwa, Bechir Hamdaoui, Attila A. Yavuz |
A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.05040, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marco Spanghero, Panos Papadimitratos |
Detecting GNSS misbehavior leveraging secure heterogeneous time sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.03385, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Adnan Mahmood, Quan Z. Sheng, Wei Emma Zhang, Yan Wang 0002, Subhash Sagar |
Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Cyber Phys. Syst. ![In: ACM Trans. Cyber Phys. Syst. 7(3), pp. 16:1-16:25, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hoonyong Park, Philip Virgil Astillo, Yongho Ko, Yeongshin Park, TaeGuen Kim 0002, Ilsun You |
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(23), pp. 9504, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sandi Rahmadika, Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, Vishal Sharma 0001, Ilsun You |
Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Biomed. Health Informatics ![In: IEEE J. Biomed. Health Informatics 27(2), pp. 710-721, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed Shabbir Ali, Pierre Merdrignac |
Distributed Misbehavior Detection based on Vehicle Perception Model and CPM Data Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall ![In: 98th IEEE Vehicular Technology Conference, VTC Fall 2023, Hong Kong, SAR, China, October 10-13, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-2928-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Taro Tsuchiya, Alejandro Cuevas, Thomas Magelinski, Nicolas Christin |
Misbehavior and Account Suspension in an Online Financial Communication Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023, pp. 2686-2697, 2023, ACM, 978-1-4503-9416-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | N. Jhansi, S. Mahaboob Basha |
Prediction of Human Misbehavior Detection From CCTV Video Recording Using Convolutional Neural Network Compared With VGG-16 Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 6th International Conference on Contemporary Computing and Informatics, IC3I 2023, Gautam Buddha Nagar, India, September 14-16, 2023, pp. 1487-1491, 2023, IEEE, 979-8-3503-0448-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anish Goyal, Archit Bhatia, Arjun Yadav, Deepak Kumar Sharma |
Misbehavior Detection in Cooperative Intelligent Transportation Systems using Temporal Fusion Transformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: 24th International Conference on Distributed Computing and Networking, ICDCN 2023, Kharagpur, India, January 4-7, 2023, pp. 431-437, 2023, ACM, 978-1-4503-9796-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Runbo Su, Arbia Riahi Sfar, Enrico Natalizio, Pascal Moyal, Ye-Qiong Song |
A Game Theoretical Model addressing Misbehavior in Crowdsourcing IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: 20th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2023, Madrid, Spain, September 11-14, 2023, pp. 195-203, 2023, IEEE, 979-8-3503-0052-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hadi Yakan, Ilhem Fajjari, Nadjib Aitsaadi, Cédric Adjih |
5G V2X Misbehavior Detection as Edge Core Network Function Based on AI/ML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, pp. 2870-2875, 2023, IEEE, 979-8-3503-1090-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock |
CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSREW ![In: 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023 - Workshops, Florence, Italy, October 9-12, 2023, pp. 57-62, 2023, IEEE, 979-8-3503-1956-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Harrison, Henish Balu, Inês Dutra |
Predicting Hard Disk Drive Faults, Failures and Associated Misbehavior's. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS Workshops ![In: IEEE International Parallel and Distributed Processing Symposium, IPDPS 2023 - Workshops, St. Petersburg, FL, USA, May 15-19, 2023, pp. 484-493, 2023, IEEE, 979-8-3503-1199-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rahma Trabelsi, Ghofrane Fersi, Mohamed Jmaiel |
Misbehavior detection systems in IoT environment: A survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACC ![In: Proceedings of the Tunisian-Algerian Joint Conference on Applied Computing (TACC 2023), Sousse, Tunisia, November 8-10, 2023., pp. 138-147, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Muhammad Akbar Husnoo, Adnan Anwar, Robin Doss, Nasser Hosseinzadeh |
Towards Robust Misbehavior Detection in Power Control Systems: A Gradient Quantization Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARTMAN@CCS ![In: Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, ARTMAN 2023, Copenhagen, Denmark, 30 November 2023, pp. 29-36, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hadi Yakan, Ilhem Fajjari, Nadjib Aitsaadi, Cédric Adjih |
Federated Learning for V2X Misbehavior Detection System in 5G Edge Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2023, Montreal, Quebec, Canada, 30 October 2023 - 3 November 2023, pp. 155-163, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhikang Liu, Hongyun Xu, Yong Kuang, Feng Li |
SVMDformer: A Semi-Supervised Vehicular Misbehavior Detection Framework Based on Transformer in IoV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 43rd IEEE International Conference on Distributed Computing Systems, ICDCS 2023, Hong Kong, July 18-21, 2023, pp. 887-897, 2023, IEEE, 979-8-3503-3986-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marek Wehmer, Ingmar Baumgart |
The Fast Rise of Cautious Vehicle-to-X: Towards Evaluating Misbehavior Detection in the Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITSC ![In: 25th IEEE International Conference on Intelligent Transportation Systems, ITSC 2022, Macau, China, October 8-12, 2022, pp. 3930-3936, 2023, IEEE, 978-1-6654-6880-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marco Spanghero, Panos Papadimitratos |
Detecting GNSS misbehavior leveraging secure heterogeneous time sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLANS ![In: IEEE/ION Position, Location and Navigation Symposium, PLANS 2023, Monterey, CA, USA, April 24-27, 2023, pp. 996-1006, 2023, IEEE, 978-1-6654-1772-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alexander Willecke, Bastian Kulke, Lars C. Wolf |
A4MD: Artery for Misbehavior Detection, Reporting, and Reaction in the ETSI C-ITS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: IEEE Vehicular Networking Conference, VNC 2023, Istanbul, Turkey, April 26-28, 2023, pp. 33-40, 2023, IEEE, 979-8-3503-3549-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hela Marouane, Abdulhalim Dandoush, Lamine Amour, Aiman Erbad |
Performance Evaluation of Machine Learning-Based Misbehavior Detection Systems in VANETs: A Comprehensive Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNCC ![In: International Symposium on Networks, Computers and Communications, ISNCC 2023, Doha, Qatar, October 23-26, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3559-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed Lamine Bouchouia |
Multi layered misbehavior detection for a connected and autonomous vehicle. (Détection de comportements anormaux multicouches pour un véhicule connecté et autonome). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
18 | Omessaad Slama, Bechir Alaya, Salah Zidi |
Towards Misbehavior Intelligent Detection Using Guided Machine Learning in Vehicular Ad-hoc Networks (VANET). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inteligencia Artif. ![In: Inteligencia Artif. 25(70), pp. 138-154, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Secil Ercan, Marwane Ayaida, Nadhir Messai |
Misbehavior Detection for Position Falsification Attacks in VANETs Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 1893-1904, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed Alzahrani, Mohd Yazid Idris, Fuad A. Ghaleb, Rahmat Budiarto |
An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 111241-111253, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Wang 0002, Yushan Zhu, Shuangshuang Han, Linyao Yang, Haixia Gu, Fei-Yue Wang 0001 |
Fast and Progressive Misbehavior Detection in Internet of Vehicles Based on Broad Learning and Incremental Learning Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(6), pp. 4788-4798, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Rajendra Prasad Nayak, Srinivas Sethi, Sourav Kumar Bhoi, Debasis Mohapatra, Rashmi Ranjan Sahoo, Pradip Kumar Sharma, Deepak Puthal |
TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 78(6), pp. 7948-7981, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|