Channel measurements over 802.11a-based UAV-to-ground links, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.1280-1284, 2011. ,
DOI : 10.1109/GLOCOMW.2011.6162389
Efficient data dissemination in cooperative vehicular???networks, Wireless Communications and Mobile Computing, vol.2, issue.2, pp.1150-1160, 2013. ,
DOI : 10.1109/TITS.2004.842407
URL : https://hal.archives-ouvertes.fr/hal-00943014
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks, IEEE Journal on Selected Areas in Communications, vol.25, issue.8, pp.1557-1568, 2007. ,
DOI : 10.1109/JSAC.2007.071006
On Data-Centric Misbehavior Detection in VANETs, 2011 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5, 2011. ,
DOI : 10.1109/VETECF.2011.6093096
An efficient intrusion detection framework in cluster-based wireless sensor networks, Security and Communication Networks, vol.5, issue.2, pp.1211-1224, 2013. ,
DOI : 10.1002/sec.286
Ad hoc-based feature selection and support vector machine classifier for intrusion detection, 2007 IEEE International Conference on Grey Systems and Intelligent Services, pp.1117-1121, 2007. ,
DOI : 10.1109/GSIS.2007.4443446
A new statistical method for detecting network anomalies in TCP traffic, European Transactions on Telecommunications, vol.34, issue.4, pp.575-588, 2010. ,
DOI : 10.1002/ett.1432
Intrusion detection techniques in sensor networks, " in Wireless Sensor Network Security (Cryptology and Information Security Series), pp.251-272, 2008. ,
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.1066-1087, 2014. ,
DOI : 10.1109/COMST.2014.2365951
Can Cryptography Secure Next Generation Air Traffic Surveillance? [Online] Available https://radionavlab.ae.utexas Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks, Proc. ION GNSS Meeting, pp.1-15, 2012. ,
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications, IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.44, issue.5, pp.593-604, 2014. ,
DOI : 10.1109/TSMC.2013.2265083
On path planning strategies for networked unmanned aerial vehicles, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.212-216, 2011. ,
DOI : 10.1109/INFCOMW.2011.5928811
SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks, Proc. IEEE INFOCOM, pp.1-9, 2010. ,
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.36-42, 2010. ,
DOI : 10.1109/MWC.2010.5601956
Traffic performance evaluation of data links in TETRA and TETRAPOL, Proc. 11th Eur. Wireless Conf. Next Gener. Wireless Mobile Commun. Services, pp.1-7, 2005. ,
Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles, IEEE Transactions on Vehicular Technology, vol.58, issue.7, pp.3533-3546, 2009. ,
DOI : 10.1109/TVT.2009.2015953
GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000. ,
DOI : 10.1145/345910.345953
Contention-based forwarding for mobile ad hoc networks, Ad Hoc Networks, vol.1, issue.4, pp.351-369, 2003. ,
DOI : 10.1016/S1570-8705(03)00038-6
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks, Computer Networks, vol.57, issue.8, pp.1821-1837, 2013. ,
DOI : 10.1016/j.comnet.2013.02.019
Characterization of receiver response to spoofing attacks, Proc. ION GNSS, pp.1-11, 2011. ,
GPS software attacks, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.450-461 ,
DOI : 10.1145/2382196.2382245
Modeling and characterization of GPS spoofing, 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp.729-734 ,
DOI : 10.1109/THS.2013.6699094
Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles, Infotech@Aerospace 2012, pp.1-30 ,
DOI : 10.1109/TCST.2009.2026285
A router-based technique to mitigate reduction of quality (RoQ) attacks, Computer Networks, vol.52, issue.5, pp.957-970, 2008. ,
DOI : 10.1016/j.comnet.2007.11.015
Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks, IEEE Wireless Communications, vol.14, issue.5, pp.8-20, 2007. ,
DOI : 10.1109/MWC.2007.4396938
Tracing cyber attacks from the practical perspective, IEEE Commun. Mag, vol.43, issue.5, pp.123-131, 2005. ,
Jamming sensor networks: Attack and defense strategies, IEEE Netw. Mag, vol.20, issue.3, pp.41-47, 2006. ,
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.36-42, 2010. ,
DOI : 10.1109/MWC.2010.5601956
Detecting malicious behavior in a vehicular DTN for public transportation, Global Information Infrastructure Symposium, GIIS 2013, pp.1-8, 2013. ,
DOI : 10.1109/GIIS.2013.6684378
Countermeasures for GPS signal spoofing, Proc. 18th Int, pp.1285-1290, 2005. ,
Routing in Sparse Vehicular Ad Hoc Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.25, issue.8, pp.1538-1556, 2007. ,
DOI : 10.1109/JSAC.2007.071005
Quickest detection of GPS spoofing attack, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6 ,
DOI : 10.1109/MILCOM.2012.6415722
Real-Time GPS Spoofing Detection via Correlation of Encrypted Signals, Navigation, vol.5, issue.1, pp.267-278, 2013. ,
DOI : 10.1016/j.ijcip.2012.09.003
An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks, IEEE Internet of Things Journal, vol.1, issue.6, pp.570-577, 2014. ,
DOI : 10.1109/JIOT.2014.2366120
Detecting Sybil attacks in VANETs, Journal of Parallel and Distributed Computing, vol.73, issue.6, pp.746-756, 2013. ,
DOI : 10.1016/j.jpdc.2013.02.001
URL : http://hdl.handle.net/10397/19763
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, Journal of Network and Computer Applications, vol.35, issue.3, pp.934-941, 2012. ,
DOI : 10.1016/j.jnca.2011.03.028
Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.303-336, 2014. ,
DOI : 10.1109/SURV.2013.052213.00046
Learning With Kernels: Support Vector Machines, Regularization, Optimization, and Beyond, 2006. ,
A new Intrusion Detection Framework for Vehicular Networks, 2014 IEEE International Conference on Communications (ICC), pp.538-543, 2014. ,
DOI : 10.1109/ICC.2014.6883374
Reputation-based framework for high integrity sensor networks, Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw, pp.66-77, 2004. ,
DOI : 10.1145/1029102.1029115
URL : http://www.ee.ucla.edu/~saurabh/publications/f21-ganeriwal.pdf
Detection and prevention from misbehaving intruders in vehicular networks, 2014 IEEE Global Communications Conference, pp.39-44, 2014. ,
DOI : 10.1109/GLOCOM.2014.7036781
Available: http://www.nsnam.org [44 A mobility model for UAV ad hoc network, Proc. IEEE Int. Conf. Unmanned Aircraft Syst, pp.383-388, 2014. ,
Predicting the performance of synchronous discrete event simulation, IEEE Trans. Parallel Distrib. Syst, vol.15, issue.12, pp.1130-1137, 2004. ,
A lightweight intrusion detection framework for wireless sensor networks LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks, Proc. IEEE Int. Conf. Depend. Syst. Netw, pp.559-572, 2005. ,
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems, IEEE Transactions on Reliability, vol.62, issue.1, pp.199-210, 2013. ,
DOI : 10.1109/TR.2013.2240891
Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.46, issue.10, pp.1429-1444, 2016. ,
DOI : 10.1109/TSMC.2015.2503399
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation, IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.45, issue.10, pp.1345-1360, 2015. ,
DOI : 10.1109/TSMC.2015.2415763
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology, IEEE Transactions on Intelligent Transportation Systems, vol.18, issue.5, pp.1-11, 2016. ,
DOI : 10.1109/TITS.2016.2600370
URL : https://hal.archives-ouvertes.fr/hal-01543420
How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network?, 2016 IEEE Global Communications Conference (GLOBECOM), pp.1-6, 2016. ,
DOI : 10.1109/GLOCOM.2016.7841878
URL : https://hal.archives-ouvertes.fr/hal-01487771