參考文獻 |
中文文獻
[1] 交通部統計處,中華民國交通統計月報,http://www.motc.gov.tw/mocwebGIP/wSite/ct?xItem=4880&ctNode=167&mp=1,民國100年。
[2] 鄭義穎,結合社會網路分析與網絡結構探勘偵測網路拍賣哄抬評價之共犯群體,國立中央大學資訊管理所碩士論文,民國 99 年。
[3] 黃建勳,應用社會網路之信任概念於車載網路上存取控制之研究,國立中央大學資訊管理所碩士論文,民國 99 年。
[4] 柯志亨、林政翰、梁浩銘、余佳育、高谷蘭,計算機網路實驗─使用 NS2 模擬多媒體通訊與無線網路,學貫出版,民國 96 年。
英文文獻
[5] World Health Organization Department of Violence & Injury Prevention & Disability (VIP), “Global status report on road safety,” http://www.who.int/violence_injury_prevention/road_safety_status/2009/en/index.html, 2009.
[6] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung and J. Hubaux, “Secure Vehicular Communication Systems: Design and Architecture,” IEEE Communications Magazine, 2008, pp. 100 – 109.
[7] T.L. Willke, P. Tientrakool and N.F. Maxemchuk, “A survey of inter-vehicle communication protocols and their applications,” IEEE Communications Surveys & Tutorials, 2009, pp. 3–20.
[8] T. Moore, “Cooperative attack and defense in distributed networks,” University of Cambridge, 2008.
[9] M. Raya, J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, 2007, pp.39–68.
[10] K. Sampigethaya, M. Li, L. Huang and, R. Poovendran, “AMOEBA: Robust Location Privacy Scheme for VANET,” IEEE Journal on Selected Areas in Communications, 2007, pp. 1569–1589.
[11] U. F. Minhas, J. Zhang, T. Tran and R. Cohen, “A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks,” IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, 2009, pp. 1–14.
[12] M. Raya, P. Papadimitratos, D. Gligor and J. Hubaux, “On Data Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE INFOCOM, 2008, pp. 1238–1246.
[13] B. Ostermaier, F. D‥otzer and M. Strassberger, “Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes,” In Proceedings of the The Second International Conference on Availability, Reliability and Security, 2007, pp. 422–431.
[14] G. Philippe, G. Dan and S. Jessica, “Detecting and Correcting Malicious Data in VANETs,” ACM international workshop on Vehicular ad hoc networks, 2004, pp. 29–37.
[15] T. H.-J. Kim, A. Studer, R. Dubey, X. Zhang, A. Perrig, F. Bai, B. Bellur and A. Iyer, “VANET Alert Endorsement Using Multi-Source Filters,” ACM international workshop on VehiculAr InterNETworking, 2010, pp. 51–60.
[16] J. Zhang, “A Survey on Trust Management for VANETs,” International Conference on Advanced Information Networking and Applications, 2011, pp. 105-112.
[17] S. Braynov and M. Jadliwala, “Representation and analysis of coordinated attacks,” ACM workshop on Formal methods in security engineering, 2003, pp. 43-51.
[18] J.K. Lou, K.T. Chen and C.L. Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems,” In Proceedings of IEEE Consumer Communications and Networking Conference, 2009, pp. 1–5.
[19] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, “A Survey Of Routing Attacks In Mobile Ad Hoc Networks,” IEEE Wireless Communications, 2007, pp. 85–91.
[20] B. Kannhavong, H. Nakayama and A. Jamalipour, “A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks,” IEEE Global Telecommunications Conference, 2006, pp. 1–5.
[21] B. Qureshi, M. Geyong and D. Kouvatsos, “Collusion Detection and Prevention with FIRE+ Trust and Reputation Model,” IEEE International Conference on Computer and Information Technology, 2010, pp. 2548–2555.
[22] S. Ozdemir, “Functional reputation based reliable data aggregation and transmission for wireless sensor networks,” The International Journal for the Computer and Telecommunications Industry, 2008, pp. 592–597.
[23] S. U. Rahman and U. Hengartner, “Secure crash reporting in vehicular Ad hoc networks,” Security and Privacy in Communications Networks and the Workshops, 2007, pp. 443–452.
[24] C. Chen, J. Zhang ; R. Cohen, P. H. Ho, “A Trust Modeling Framework for Message Propagation and Evaluation in VANETs,” Information Technology Convergence and Services, 2010, pp. 1–8.
[25] I. Salhi, M.O. Cherif, S.M. Senouci, “A New Architecture for Data Collection in Vehicular Networks,” IEEE International Conference on Communications, 2009, pp. 1-6.
[26] Karnadi, F. K., Mo, Z. H. and Lan., K-C., “Rapid Generation of Realistic Mobility Models for VANET,” IEEE Wireless Communications and Networking Conference, 2007, pp. 2506–2511.
[27] X. Zhuo, J. Hao, D. Liu and Y. Dai, “Removal of Misbehaving Insiders in Anonymous VANETs,” ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, 2009, pp. 106–115.
相關網站
[28] Dedicated short-range communications, http://en.wikipedia.org/wiki/Dedicated_short-range_communications.
[29] IEEE 1609 Working Group Public Site, http://vii.path.berkeley.edu/1609_wave/.
[30] 警政署詐騙排名, http://165.gov.tw/fraud_rank.aspx .
[31] 線上牛津字典, http://www.oxfordadvancedlearnersdictionary.com/dictionary/ .
[32] SUMO, http://sumo.sourceforge.net/.
[33] The Network Simulator – NS-2, http://www.isi.edu/nsnam/ns/ .
|