Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/68207

Registo completo
Campo DCValorIdioma
dc.contributor.authorGonçalves, Fábio Raul Costapor
dc.contributor.authorRibeiro, Bruno Daniel Mestre Vianapor
dc.contributor.authorGama, Óscar Sílvio Marques Almeidapor
dc.contributor.authorSantos, Alexandrepor
dc.contributor.authorCosta, Antóniopor
dc.contributor.authorDias, Brunopor
dc.contributor.authorMacedo, Joaquimpor
dc.contributor.authorNicolau, Maria Joãopor
dc.date.accessioned2020-11-17T10:18:57Z-
dc.date.available2022-01-01T07:00:38Z-
dc.date.issued2019-
dc.identifier.citationGoncalves, F., Ribeiro, B., Gama, O., Santos, A., Costa, A., Dias, B., … Nicolau, M. J. (2019, October). A Systematic Review on Intelligent Intrusion Detection Systems for VANETs. 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE. http://doi.org/10.1109/icumt48472.2019.8970942-
dc.identifier.isbn9781728157634por
dc.identifier.issn2157-0221-
dc.identifier.urihttps://hdl.handle.net/1822/68207-
dc.description.abstractVehicular Ad hoc Networks (VANETs) are a growing area that continues to gain interest with an increasing diversity of applications available. These are the underlying network for Intelligent Transportation Systems (ITS), a set of applications and services that aim to provide greater security and comfort to drivers and passengers. However, the characteristics and size of a VANET make it a security challenge. It has been a subject of study, with several research works aimed at this problem, usually involving cryptography. There are, however, some attacks that cannot be solved using traditional methodologies. For example, Sybil attack, Denial of Service (DoS), Black Hole, etc. are not preventable using cryptographic tools. Nonetheless, using an Intrusion Detection System (IDS) can help to detect malicious behavior, preventing further damage. This work presents a Systematic Literature Review (SLR) that aims to evaluate the feasibility of this type of solution. Additionally, it should provide information about the most common approaches, allowing the identification of the most used Machine Learning (ML) algorithms, architectures and datasets.por
dc.description.sponsorshipThis work has been sponsored by the Portugal Incentive System for Research and Technological Development. Project in co-promotion 002797/2015 (INNOVCAR 2015-2018), and also by COMPETE: POCI-01-0145-FEDER-007043 and FCT - Fundação para a Ciência e Tecnologia within the Project Scope: UID/CEC/00319/2019.por
dc.language.isoengpor
dc.publisherIEEEpor
dc.relationinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UID%2FCEC%2F00319%2F2019/PTpor
dc.rightsopenAccesspor
dc.subjectIntrusion Detection Systempor
dc.subjectMachine Learningpor
dc.subjectSystematic Literature Reviewpor
dc.subjectVANETspor
dc.titleA systematic review on intelligent intrusion detection Systems for VANETseng
dc.typeconferencePaperpor
dc.peerreviewedyespor
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/8970942por
oaire.citationVolume2019-Octoberpor
dc.date.updated2020-11-17T09:53:09Z-
dc.identifier.doi10.1109/ICUMT48472.2019.8970942por
dc.subject.wosScience & Technologypor
sdum.export.identifier7519-
sdum.journalInternational Congress on Ultra Modern Telecommunications and Control Systems and Workshopspor
sdum.conferencePublication2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT)por
Aparece nas coleções:CAlg - Artigos em livros de atas/Papers in proceedings

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
ids-slr-ieee.pdf236,28 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID