References
- Z. F. Zhang, L. Tang, G. W. Yang. Study and simulation of malicious node automatic detection in Mobile Network. Computer Simulation, 33(2016) 293–296.
- L. Ma, J. Liu, B. Duan et al. A theoretical estimation for the optimal network robustness measure R against malicious node attacks. Epl, 111(2015) 28–33.
- T. Hynek, J. Sykora. Wireless physical layer network coding in potential presence of malicious relays–incomplete information game approach. Electronics Letters, 51(2015) 1292–1294. doi: 10.1049/el.2015.0832
- K. Zaidi, M. Milojevic, V. Rakocevic et al. Host Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection. IEEE Transactions on Vehicular Technology, 20(2015) 1–2.
- M. J. Faghihniya, S. M. Hosseini, M. Tahmasebi. Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wireless Networks, 20(2016) 1–12.
- R. Ahmed, M. E. Sayed, S. A. Gadsden, et al. Automotive Internal-Combustion-Engine Fault Detection and Classification Using Artificial Neural Network Techniques. IEEE Transactions on Vehicular Technology, 64(2015) 21–33. doi: 10.1109/TVT.2014.2317736
- A. Parrinello, P. Mantegazza.: Improvements and Extensions to a Full-Potential Formulation Based on Independent Fields. Aiaa Journal, 50(2015) 571–580. doi: 10.2514/1.J051270