The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015 IEEE Symposium on Computers and Communication (ISCC) 2015
DOI: 10.1109/iscc.2015.7405496
|View full text |Cite
|
Sign up to set email alerts
|

A probabilistic model to corroborate three attacks in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The proposal is to use " signature-based authentication mechanisms" to reduce the effect of the DOS attack. In the study [42], the authors propose an innovative probabilistic model based on logistic regression. This method makes it possible to estimate the appearance of an attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposal is to use " signature-based authentication mechanisms" to reduce the effect of the DOS attack. In the study [42], the authors propose an innovative probabilistic model based on logistic regression. This method makes it possible to estimate the appearance of an attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Logistic regression can be used to find the probability of the event of an attack using Equation (23) PY=1=eNVA1x1+NVA2x2+NVA3x31+e()italicNVA1x1+italicNVA2x2+italicNVA3x3 where Y is the attack to predict (dependent variable), NV A 1, NV A 2, and NV A 3 are the estimations parameters, X j is the predictor variables (the parameters are the three attacks used in simulation in). Authors in Reference proposed an efficient and lightweight intrusion detection scheme for vehicular network to protect it from the malicious attacks.…”
Section: Countermeasures To Handle Attacks In Vanetmentioning
confidence: 99%
“…where Y is the attack to predict (dependent variable), NV A1, NV A2, and NV A3 are the estimations parameters, X j is the predictor variables (the parameters are the three attacks used in simulation in 69 ). Authors in Reference 70 proposed an efficient and lightweight intrusion detection scheme for vehicular network to protect it from the malicious attacks.…”
Section: Machine Leaning-basedmentioning
confidence: 99%
See 2 more Smart Citations