Eviction of misbehaving and faulty nodes in vehicular networks

M Raya, P Papadimitratos, I Aad… - IEEE journal on …, 2007 - ieeexplore.ieee.org
Vehicular networks (VNs) are emerging, among civilian applications, as a convincing
instantiation of the mobile networking technology. However, security is a critical factor and a …

Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications

Q Wu, J Domingo-Ferrer… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are being designed to improve traffic safety and
efficiency. To meet this goal, the messages disseminated in VANETs must be trustworthy …

Contextual information fusion for intrusion detection: a survey and taxonomy

A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means
an easy task. One particular limitation of existing research originates from the uncertainty of …

Safety and privacy in vehicular communications

J Domingo-Ferrer, Q Wu - Privacy in Location-Based Applications …, 2009 - Springer
Vehicular ad hoc networks (VANETs) will improve traffic safety and efficiency provided that
car-to-car communication stays trustworthy. Therefore, it is crucial to ensure that the …

Intrusion detection using MDL compression

EE Eiland, SC Evans, TS Markham… - US Patent 8,375,446, 2013 - Google Patents
This application is a continuation of US patent applica tion Ser. No. 12/260,627, filed Oct. 29,
2008, the entire dis closure of which is hereby incorporated by reference. Embodiments of …

Investigating the effects of attack detection for in-vehicle networks based on clock drift of ECUs

H Ji, Y Wang, H Qin, X Wu, G Yu - IEEE Access, 2018 - ieeexplore.ieee.org
As external interfaces of vehicles multiply, information security of an automobile network
system has become increasingly troubling. Mounting attacks have raised the attention of …

Privacy issues for transportation cyber physical systems

M Han, Z Duan, Y Li - Secure and Trustworthy Transportation Cyber …, 2017 - Springer
Abstract Transportation Cyber-Physical Systems (TCPS) developed a lot with the
advancement of the transportation industry worldwide. The rapid proliferation of TCPS …

Data discovery and anomaly detection using atypicality: Theory

A Høst-Madsen, E Sabeti… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A central question in the era of big data is what to do with the enormous amount of
information. One possibility is to characterize it through statistics, eg, averages, or classify it …

[HTML][HTML] A pattern dictionary method for anomaly detection

E Sabeti, S Oh, PXK Song, AO Hero - Entropy, 2022 - mdpi.com
In this paper, we propose a compression-based anomaly detection method for time series
and sequence data using a pattern dictionary. The proposed method is capable of learning …

Privacy in georeferenced context-aware services: A survey

D Riboni, L Pareschi, C Bettini - Privacy in Location-Based Applications …, 2009 - Springer
Location based services (LBS) are a specific instance of a broader class of Internet services
that are predicted to become popular in a near future: context-aware services. The privacy …