[1]
|
Kadum, A. (2013) A Survey on Vehicular Ad Hoc and Sensor Networks (VASNET).
|
[2]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306
|
[3]
|
Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28. http://dx.doi.org/10.4236/ijcns.2015.83003
|
[4]
|
Sivasakthi, M. and Suresh, S. (2013) Research on Vehicular Ad Hoc Networks (VANETs): An Overview. Journal of Applied Sciences and Engineering Research, 2, 23-27.
|
[5]
|
Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, Society for Science and Education, United Kingdom, 2, 1-6.
|
[6]
|
(2011) Vehicular Ad Hoc and Sensor Networks—Principles and Challenges. International Journal of Ad Hoc, Sensor & Ubiquitous Computing (IJASUC), 2.
|
[7]
|
Li, F. and Wang, Y. (2007) Routing in Vehicular Ad Hoc Networks: A Survey. IEEE Vehicular Technology Magazine, 2, 12-22.
|
[8]
|
Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
|
[9]
|
Li, F. and Wang, Y. (2007) Routing in Vehicular Ad Hoc Networks: A Survey. IEEE of Vehicular Technology Magazine, 2, 12-22. http://dx.doi.org/10.1109/MVT.2007.912927
|
[10]
|
Saha, A.K. and Johnson, D.B. (2004) Modelling Mobility for Vehicular Ad Hoc Networks. ACM International Workshop on Vehicular Ad Hoc Networks, Philedelphia, 91-92.
|
[11]
|
Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372. http://dx.doi.org/10.4236/ijcns.2014.79038
|
[12]
|
Manvi, S.S., Kakkasageri, M.S. and Mahapurush, C.V. (2009) Performance Analysis of AODV, DSR, and Swarm Intelligence Routing Protocols in Vehicular Ad Hoc Network Environment. International Conference on Future Computer and Communication, Kuala Lumpar, 3-5 April 2009, 21-25.
|
[13]
|
Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. Proceedings of the 6th International Conference on Security of Information and Networks (SIN ’13). Aksaray, 26-28 November 2013, 454-456. http://dx.doi.org/10.1145/2523514.2523586
|
[14]
|
Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. 2013 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337. http://dx.doi.org/10.1109/cicsyn.2013.79
|
[15]
|
Bernsen, J. and Manivannan, D. (2008) Routing Protocols for Vehicular Ad Hoc Networks That Ensure Quality of Service. The 4th International Conference on Wireless and Mobile Communications, Athens, 27 July-1 August 2008, 1-6. http://dx.doi.org/10.1109/icwmc.2008.15
|
[16]
|
Taleb, T., Sakhaee, E., Jamalipour, A., Hashimoto, K., Kato, N. and Nemoto, Y. (2007) A Stable Routing Protocol to Support ITS Services in VANET Networks. IEEE Transactions on Vehicular Technology, 56, 3337-3347. http://dx.doi.org/10.1109/TVT.2007.906873
|
[17]
|
Sari, A. (2014) Economic Impact of Higher Education Institutions in a Small Island: A Case of TRNC. Global Journal of Sociology, 4, 41-45.
|
[18]
|
Hartenstein, H. and Laberteaux, K.P. (2008) A Tutorial Survey on Vehicular Ad Hoc Networks. IEEE Communication Magazine, 46, 164-171.
|
[19]
|
Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.
|
[20]
|
Eichler, S., Ostermaier, B., Schroth, C. and Kosch, T. (2005) Simulation of Car-to-Car Messaging: Analyzing the Impact on Road Traffic. IEEE ASCOTS, 507-510.
|
[21]
|
Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42. http://dx.doi.org/10.4236/ijcns.2015.83004
|
[22]
|
Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154. http://dx.doi.org/10.4236/jis.2015.62015
|
[23]
|
Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273. http://dx.doi.org/10.4236/ijcns.2015.87026
|
[24]
|
Gerlach, M. (2006) Full Paper: Assessing and Improving Privacy in VANETs. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=84FC4EF0852B23FBF15CF35E16E0450D?doi=10.1.1.84.8167&rep=rep1&type=pdf
|
[25]
|
Dahiya, A. and Chauhan, R. (2010) A Comparative Study of MANET and VANET Environment. Journal of Computing, 2.
|
[26]
|
Sesay, S., Yang, Z. and He, J.H. (2004) A Survey on Mobile Ad Hoc Network. Information Technology Journal, 3, 168-175. http://dx.doi.org/10.3923/itj.2004.168.175
|
[27]
|
Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582. http://dx.doi.org/10.1109/TAEECE.2013.6557339
|
[28]
|
Toor, Y., Muhlethaler, P. and Laouiti, A. (2008) Vehicle Ad Hoc Networks: Applications and Related Technical Issues. IEEE Communications Surveys & Tutorials, 10, 74-88. http://dx.doi.org/10.1109/comst.2008.4625806
|
[29]
|
Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18. http://dx.doi.org/10.14738/tmlai.25.430
|
[30]
|
Hu, Y.-C. and Laberteaux, K. (2006) Strong Security on a Budget. Wksp. Embedded Security for Cars. http://www.laberteaux.org/papers/vanet08-epidemic.pdf
|
[31]
|
Raya, M. and Hubaux, J. (2005) The Security of Vehicular Ad Hoc Networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, 7-10 November 2005, 11-21. http://dx.doi.org/10.1145/1102219.1102223
|
[32]
|
Robinson, C.L., Caminiti, L., Caveney, D. and Laberteaux, K. (2006) Efficient Coordination and Transmission of Data for Cooperative Vehicular Safety Applications. In VANET’06: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, New York, 10-19.
|
[33]
|
Sari, A. and Mahmutoglu, H. (2013) Potential Issues and Impacts of ICT Applications through Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 89, 585-592. http://dx.doi.org/10.1016/j.sbspro.2013.08.899
|
[34]
|
Aijaz, A., Bochow, B., Dotzer, F., Festag, A., Gerlach, M., Kroh, R., et al. (2006) Attacks on Inter-Vehicle Communication Systems—An Analysis. International Workshop on Intelligent Transportation, Hamburg, 189-194.
|
[35]
|
Buttyan, L. and Hubaux, J.-P. (2001) Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Swiss Federal Institute of Technology, Laussane.
|
[36]
|
Sari, A. (2012) Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development, 2, 18-30. http://dx.doi.org/10.5296/ijld.v2i2.1371
|
[37]
|
Callandriello, G., Papadimitratos, P., Lloy, A. and Hubaux, J.-P. (2007) Efficient and Robust Pseudonymous Authentication in VANET. International Workshop on Vehicular Ad Hoc Networks, Montreal, 9-14 September 2007, 19-28.
|
[38]
|
Boneh, D. and Shacham, H. (2004) Group Signatures with Verifier-Local Revocation. Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, 25-29 October 2004, 168-177. http://dx.doi.org/10.1145/1030083.1030106
|
[39]
|
Armstrong Consulting Inc. (n.d.). Dedicated Short Range Communications (DSRC) Home. Retrieved October 2009. http://www.leearmstrong.com/DSRC/DSRCHomeset.htm
|
[40]
|
Sakib, R.K. and Reza, B. (2010) Security Issues in VANET.
|
[41]
|
de Fuentes, J.M., González-Tablas, A.I. and Ribagorda, A. (2010) Overview of Security Issues in Vehicular Ad-Hoc Networks.
|
[42]
|
Harsch, C., Festag, A. and Papadimitratos, P. (2007) Secure Position-Based Routing for VANETs. Proceedings of IEEE 66th Vehicular Technology Conference, VTC-2007, Baltimore, 30 September-3 October 2007, 26-30. http://dx.doi.org/10.1109/vetecf.2007.22
|
[43]
|
Sari, A. (2014) Influence of ICT Applications on Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 116, 4939-4945. http://dx.doi.org/10.1016/j.sbspro.2014.01.1053
|
[44]
|
Sun, S., Kim, J., Jung, Y. and Kim, K. (2009) Zone-Based Greedyperimeter Stateless Routing for VANET. Proceedings of International Conference on Information Networking, ICOIN 2009, Chiang Mai, 21-21 January 2009, 1-3.
|
[45]
|
Yu, D. and Ko, Y.-B. (2009) FFRDV: Fastest-Ferry Routing in DTN-Enabled Vehicular Ad Hoc Networks. Proceedings of 11th International Conference on Advanced Communication Technology, 2, 1410-1414.
|
[46]
|
Ali, S. and Bilal, S. (2009) An Intelligent Routing Protocol for VANETs in City Environments. Proceedings of 2nd International Conference on Computer, Control and Communication, IC4 2009, Karachi, 17-18 February 2009, 1-5. http://dx.doi.org/10.1109/ic4.2009.4909249
|
[47]
|
Yang, J. and Fei, Z. (2013) Broadcasting with Prediction and Selective Forwarding in Vehicular Networks. International Journal of Distributed Sensor Networks, 2013, Article ID: 309041. http://dx.doi.org/10.1155/2013/309041
|
[48]
|
Chen, W., Guha, R.K., Taek, J.K., Lee, J. and Hsu, I.Y. (2008) A Survey and Challenges in Routing and Data Dissemination in Vehicular Ad-Hoc Networks. Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES ’08), Columbus, 22-24 September 2008, 328-333.
|
[49]
|
Wahid, A., Yoo, H. and Kim, D. (2010) Unicast Geographic Routing Protocols for Inter-Vehicle Communications: A Survey. Proceedings of the 5th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wire Networks (PM2HW2N ’10), Bodrum, 17-21 October 2010, 17-24. http://dx.doi.org/10.1145/1868612.1868616
|
[50]
|
Moustafa, H. and Zhang, Y. (2009) Vehicular Networks: Techniques, Standards, and Applications. CRC Press, Boca Raton. http://dx.doi.org/10.1201/9781420085723
|
[51]
|
https://www.academia.edu/8721918/VANET_Vehicle_Ad_hoc_Networks
|
[52]
|
http://en.wikipedia.org/wiki/OSImodel
|
[53]
|
Hartenstein, H. and Laberteaux, K. (2010) VANET-Vehicular Applications and Inter-Networking Technologies. John Wiley & Sons, Hoboken.
|
[54]
|
Maier, M.W., Emery, D. and Hilliard, R. (2004) ANSI/IEEE 1471 and Systems Engineering. Systems Engineering, 7, 257-270. http://dx.doi.org/10.1002/sys.20008
|
[55]
|
https://en.wikipedia.org/wiki/IEEE_802.11p
|
[56]
|
Kosch, T., Schroth, C., Strassberger, M. and Bechler, M. (2012) Automotive Internetworking. Wiley, New York. http://dx.doi.org/10.1002/9781119944737
|