References
[1]. Jinyuan Sun, and Chi Zhang, (2010). An Identity-Based
Security System for User Privacy in Vehicular Ad Hoc
Networks. IEEE, vol. 21, No. 9, Sep2010.
[2]. Nwokedi Idika (nidika@purdue.edu). A Survey of
Malware Detection Techniques, Department of Computer
Science Purdue University, West Lafayette, IN 47907.
[3]. Richard Yu, (2011). Senior Structural Results for
Combined Continuous User Authentication and Intrusion
Detection in High Security Mobile Ad-Hoc Networks, IEEE
Transactions on wireless communications, Vol. 10, No. 9,
September.
[4]. Meng-Yen Hsieh, Hsiehet al. (2011). Secure protocols
for data propagation and group communication in
vehicular networks, EURASIP Journal on Wireless
Communications and Networking.
[5]. Ziming Zhao (2012). Risk-Aware Mitigation for MANET
Routing Attacks, IEEE Transactions on dependable and
secure computing, vol. 9, no. 2, April.
[6]. Jinyuan Sun and Yuguang Fang (2008). A Defense
technique against misbehavior in VANETs based on
Threshold Authentication. IEEE.
[7]. M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P.
Hubaux (2007). Eviction of Misbehaving and Faulty Nodes
in Vehicular Networks. IEEE Areas in Communications, Vol.
25, No. 8, October.
[8]. Security and Privacy in VANET to reduce Authentication
Overhead for Rapid Roaming Networks. International
Journal of Computer Applications (0975 – 8887), February
2010.
[9]. Ahren Studer, Elaine Shi, Fan Bai, and Adrian Perrig
(2008). TACKing Together Efficient Authentication,
Revocation, and Privacy in VANETs, March 14, 2008.
[10]. Ying Zhu, (2011). Attack Pattern Discovery in Forensic
Investigation of Network Attacks, IEEE Areas in
communications, August.