Academic literature on the topic 'Securing Vehicular'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Securing Vehicular.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Securing Vehicular"
Raya, Maxim, Panos Papadimitratos, and Jean-pierre Hubaux. "SECURING VEHICULAR COMMUNICATIONS." IEEE Wireless Communications 13, no. 5 (2006): 8–15. http://dx.doi.org/10.1109/wc-m.2006.250352.
Full textFernandez, Pedro J., Jose Santa, Fernando Bernal, and Antonio F. Skarmeta. "Securing Vehicular IPv6 Communications." IEEE Transactions on Dependable and Secure Computing 13, no. 1 (2016): 46–58. http://dx.doi.org/10.1109/tdsc.2015.2399300.
Full textMoussaoui, Djilali, Mohamed Feham, Boucif Amar Bensaber, and Benamar Kadri. "Securing vehicular cloud networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4154. http://dx.doi.org/10.11591/ijece.v9i5.pp4154-4162.
Full textRaya, Maxim, and Jean-Pierre Hubaux. "Securing vehicular ad hoc networks." Journal of Computer Security 15, no. 1 (2007): 39–68. http://dx.doi.org/10.3233/jcs-2007-15103.
Full textSaez, Y., X. Cao, L. B. Kish, and G. Pesti. "Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol." Fluctuation and Noise Letters 13, no. 03 (2014): 1450020. http://dx.doi.org/10.1142/s0219477514500205.
Full textMei, Fang, Shengjie Liu, Jian Wang, Yuming Ge, and Tie Feng. "Negotiation-Free Encryption for Securing Vehicular Unicasting Communication." Applied Sciences 9, no. 6 (2019): 1121. http://dx.doi.org/10.3390/app9061121.
Full textTrouli, Georgia-Irene, and George Kornaros. "Automotive Virtual In-sensor Analytics for Securing Vehicular Communication." IEEE Design & Test 37, no. 3 (2020): 91–98. http://dx.doi.org/10.1109/mdat.2020.2974914.
Full textRathee, Sharma, Iqbal, Aloqaily, Jaglan, and Kumar. "A Blockchain Framework for Securing Connected and Autonomous Vehicles." Sensors 19, no. 14 (2019): 3165. http://dx.doi.org/10.3390/s19143165.
Full textShrestha, Rakesh, Seung Yeob Nam, Rojeena Bajracharya, and Shiho Kim. "Evolution of V2X Communication and Integration of Blockchain for Security Enhancements." Electronics 9, no. 9 (2020): 1338. http://dx.doi.org/10.3390/electronics9091338.
Full textLee, Jong-Hyouk, Jiefeng (Terence) Chen, and Thierry Ernst. "Securing mobile network prefix provisioning for NEMO based vehicular networks." Mathematical and Computer Modelling 55, no. 1-2 (2012): 170–87. http://dx.doi.org/10.1016/j.mcm.2011.02.023.
Full textDissertations / Theses on the topic "Securing Vehicular"
Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.
Full textAldabbas, Hamza. "Securing data dissemination in vehicular ad hoc networks." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7987.
Full textMejri, Mohamed Nidhal. "Securing Vehicular Networks Against Denial of Service Attacks." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCD038/document.
Full textCorser, George P. "Securing location privacy in vehicular applications and communications." Thesis, Oakland University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10169186.
Full textDadras, Soodeh. "Security of Vehicular Platooning." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7445.
Full textKarthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Full textGomes, Gonçalo Miguel Vieira. "Forwarding and security in vehicular networks." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/15927.
Full textDuarte, Daniel Belém de Almeida. "Implementation of security services for vehicular communications." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/11677.
Full textAl-Shareeda, Sarah Yaseen Abdulrazzaq. "Enhancing Security, Privacy, and Efficiency of Vehicular Networks." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu150032914711847.
Full textLim, Kiho. "Secure and Authenticated Message Dissemination in Vehicular ad hoc Networks and an Incentive-Based Architecture for Vehicular Cloud." UKnowledge, 2016. http://uknowledge.uky.edu/cs_etds/48.
Full textBooks on the topic "Securing Vehicular"
Du, Suguo, and Haojin Zhu. Security Assessment in Vehicular Networks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9357-0.
Full textWolf, Marko. Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3.
Full textLin, Xiaodong, and Rongxing Lu, eds. Vehicular Ad Hoc Network Security and Privacy. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119082163.
Full textWolf, Marko. Security Engineering for Vehicular IT Systems: Improving the Trustworthiness and Dependability of Automotive IT Applications. Vieweg+Teubner Verlag / GWV Fachverlage GmbH, Wiesbaden, 2009.
Find full textLin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley & Sons, Incorporated, John, 2015.
Find full textLin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley-Interscience, 2015.
Find full textLin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley & Sons, Incorporated, John, 2015.
Find full textRawat, Danda B., and Chandra Bajracharya. Vehicular Cyber Physical Systems: Adaptive Connectivity and Security. Springer, 2016.
Find full textBook chapters on the topic "Securing Vehicular"
Rawat, Danda B., and Chandra Bajracharya. "Securing VANETs for Vehicular CPS." In Vehicular Cyber Physical Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44494-9_4.
Full textAhmed, Wedad, and Mourad Elhadef. "Securing Intelligent Vehicular Ad Hoc Networks: A Survey." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7605-3_2.
Full textProgga, Farhat Tasnim, Hossain Shahriar, Chi Zhang, and Maria Valero. "Securing Vehicular Network Using AI and Blockchain-Based Approaches." In Studies in Big Data. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74575-2_2.
Full textJain, Vaishali, Rajendra Singh Kushwah, and Ranjeet Singh Tomar. "Named Data Network Using Trust Function for Securing Vehicular Ad Hoc Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0589-4_43.
Full textPopescu-Zeletin, Radu, Ilja Radusch, and Mihai Adrian Rigani. "Security." In Vehicular-2-X Communication. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-77143-2_8.
Full textHartong, Mark, Rajni Goel, and Duminda Wijesekera. "Security and Dependability in Train Control Systems." In Vehicular Networking. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470661314.ch6.
Full textPapadimitratos, Panos. "Security and Privacy Mechanisms for Vehicular Networks." In Vehicular Networking. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470661314.ch5.
Full textWolf, Marko. "Vehicular Security Technologies." In Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_7.
Full textWolf, Marko. "Vehicular Security Mechanisms." In Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_8.
Full textEckhoff, David. "Vehicular Privacy." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1529-1.
Full textConference papers on the topic "Securing Vehicular"
Liu, Xiaonan, Zhiyi Fang, and Lijun Shi. "Securing Vehicular Ad Hoc Networks." In 2007 2nd International Conference on Pervasive Computing and Applications. IEEE, 2007. http://dx.doi.org/10.1109/icpca.2007.4365481.
Full textAsplund, Mikael. "Poster: Securing vehicular platoon membership." In 2014 IEEE Vehicular Networking Conference (VNC). IEEE, 2014. http://dx.doi.org/10.1109/vnc.2014.7013324.
Full textMazilu, S., M. Teler, and C. Dobre. "Securing Vehicular Networks Based on Data-Trust Computation." In 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, 2011. http://dx.doi.org/10.1109/3pgcic.2011.18.
Full textVaszary, Mark, Andreas Slovacek, Yanyan Zhuang, and Sang-Yoon Chang. "Securing Tire Pressure Monitoring System for Vehicular Privacy." In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2021. http://dx.doi.org/10.1109/ccnc49032.2021.9369576.
Full textRawat, Danda B., Bhed Bahadur Bista, and Gongjun Yan. "Securing vehicular ad-hoc networks from data falsification attacks." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7847967.
Full textEltayeb, Mohammed E., and Robert W. Heath. "Securing mmWave Vehicular Communication Links with Multiple Transmit Antennas." In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2018. http://dx.doi.org/10.1109/iccw.2018.8403556.
Full textTeler, Mihaela, and Valentin Cristea. "Securing Vehicular Networks Using Deterministic Schemes for Computing Trust." In 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.123.
Full textBermad, Nabila, Salah Zemmoudj, and Mawloud Omar. "Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks." In 2019 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN). IEEE, 2019. http://dx.doi.org/10.23919/pemwn47208.2019.8986956.
Full textAl-Dhuraibi, Wedad Ahmed, and Mourad Elhadef. "Securing Vehicular Ad-Hoc Networks: A DDoS Case Study." In 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2021. http://dx.doi.org/10.1109/iccakm50778.2021.9357733.
Full textAmari, Houda, Wassef Louati, Lyes Khoukhi, and Lamia Hadrich Belguith. "Securing Software-Defined Vehicular Network Architecture against DDoS attack." In 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, 2021. http://dx.doi.org/10.1109/lcn52139.2021.9524953.
Full text