1.
S. Olariu et M. C. Weigle, Éd., Vehicular Networks: From Theory to Practice. New York: Chapman and Hall/CRC, 2009. doi: 10.1201/9781420085891.
2.
A. I. Ameur, A. Lakas, Y. M. Bachir, et O. S. Oubbati, “ Peer-to-peer overlay techniques for vehicular ad hoc networks: Survey and challenges ”, Veh. Commun., p. 100455, 2022.
3.
S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, et H. Zedan, “ A comprehensive survey on vehicular Ad Hoc network ”, J. Netw. Comput. Appl., vol. 37, p. 380?392, janv. 2014, doi: 10.1016/j.jnca.2013.02.036.
4.
A. Zekri et W. Jia, “ Heterogeneous vehicular communications: A comprehensive study ”, Ad Hoc Netw., vol. 75, p. 52?79, 2018.
5.
M. L. Sichitiu et M. Kihl, “ Inter-vehicle communication systems: a survey ”, IEEE Commun. Surv. Tutor., vol. 10, no 2, p. 88?105, 2008.
6.
R. S. Raw, M. Kumar, et N. Singh, “ Security challenges, issues and their solutions for VANET ”, Int. J. Netw. Secur. Its Appl., vol. 5, no 5, p. 95, 2013.
7.
G. Samara, W. A. H. Al-Salihy, et R. Sures, “ Security Analysis of Vehicular Ad Hoc Nerworks (VANET) ”, in 2010 Second International Conference on Network Applications, Protocols and Services, sept. 2010, p. 55?60. doi: 10.1109/NETAPPS.2010.17.
8.
N. K. Chaubey, “ Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study ”, Int. J. Secur. Its Appl., vol. 10, no 5, p. 261?274, 2016.
9.
K. Lim et D. Manivannan, “ An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks ”, Veh. Commun., vol. 4, p. 30?37, avr. 2016, doi: 10.1016/j.vehcom.2016.03.001.
10.
V. H. La et A. R. Cavalli, “ Security attacks and solutions in vehicular ad hoc networks: a survey ”, Int. J. AdHoc Netw. Syst. IJANS, vol. 4, no 2, p. 1?20, 2014.
11.
A. Y. Dak, S. Yahya, et M. Kassim, “ A literature survey on security challenges in VANETs ”, Int. J. Comput. Theory Eng., vol. 4, no 6, p. 1007, 2012.
12.
M. Raya, A. Aziz, et J.-P. Hubaux, “ Efficient secure aggregation in VANETs ”, in Proceedings of the 3rd international workshop on Vehicular ad hoc networks, 2006, p. 67?75.
13.
H. Hasrouny, A. E. Samhat, C. Bassil, et A. Laouiti, “ VANet security challenges and solutions: A survey ”, Veh. Commun., vol. 7, p. 7?20, 2017.
14.
P. Sakarindr et N. Ansari, “ Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks ”, IEEE Wirel. Commun., vol. 14, no 5, p. 8?20, 2007.
15.
T. Alpcan et S. Buchegger, “ Security Games for Vehicular Networks ”, IEEE Trans. Mob. Comput., vol. 10, no 2, p. 280?290, févr. 2011, doi: 10.1109/TMC.2010.146.
16.
H. Sedjelmaci, M. Hadji, et N. Ansari, “ Cyber security game for intelligent transportation systems ”, IEEE Netw., vol. 33, no 4, p. 216?222, 2019.
17.
J. Von Neumann et O. Morgenstern, Theory of games and economic behavior, 2nd rev. ed. in Theory of games and economic behavior, 2nd rev. ed. Princeton, NJ, US: Princeton University Press, 1947, p. xviii, 641.
18.
J. W. Weibull, “ Evolution, rationality and equilibrium in games ”, Eur. Econ. Rev., vol. 42, no 3?5, p. 641?649, 1998.
19.
J. W. Friedman, Game Theory with Applications to Economics. New York: Oxford University Press, 1986.
20.
B. Subba, S. Biswas, et S. Karmakar, “ A game theory based multi layered intrusion detection framework for VANET ”, Future Gener. Comput. Syst., vol. 82, p. 12?28, mai 2018, doi: 10.1016/j.future.2017.12.008.
21.
J. Sun et al., “ An intrusion detection based on Bayesian game theory for UAV network ”, in 11th EAI International Conference on Mobile Multimedia Communications, 2018, p. 56?67.
22.
J. Zhang, F.-Y. Wang, K. Wang, W.-H. Lin, X. Xu, et C. Chen, “ Data-driven intelligent transportation systems: A survey ”, IEEE Trans. Intell. Transp. Syst., vol. 12, no 4, p. 1624?1639, 2011.
23.
M. N. Mejri, N. Achir, et M. Hamdi, “ A new security games based reaction algorithm against DOS attacks in VANETs ”, in 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2016, p. 837?840.
24.
H. Sedjelmaci, S. M. Senouci, et T. Bouali, “ Predict and prevent from misbehaving intruders in heterogeneous vehicular networks ”, Veh. Commun., vol. 10, p. 74?83, 2017.
25.
A. Mabrouk, A. Kobbane, et M. El Koutbi, “ Signaling Game-based Approach to Improve Security in Vehicular Networks. ”, in VEHITS, 2018, p. 495?500.
26.
H. Sedjelmaci, I. H. Brahmi, A. Boudguiga, et W. Klaudel, “ A generic cyber defense scheme based on stackelberg game for vehicular network ”, in 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2018, p. 1?6.
27.
H. Sedjelmaci, I. H. Brahmi, N. Ansari, et M. H. Rehmani, “ Cyber security framework for vehicular network based on a hierarchical game ”, IEEE Trans. Emerg. Top. Comput., vol. 9, no 1, p. 429?440, 2019.
28.
T. Halabi, O. A. Wahab, R. Al Mallah, et M. Zulkernine, “ Protecting the Internet of vehicles against advanced persistent threats: a bayesian Stackelberg game ”, IEEE Trans. Reliab., vol. 70, no 3, p. 970?985, 2021.
29.
I. Stellios, P. Kotzanikolaou, et M. Psarakis, “ Advanced persistent threats and zero-day exploits in industrial Internet of Things ”, Secur. Priv. Trends Ind. Internet Things, p. 47?68, 2019.
30.
A. Alshamrani, S. Myneni, A. Chowdhary, et D. Huang, “ A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities ”, IEEE Commun. Surv. Tutor., vol. 21, no 2, p. 1851?1877, 2019.
31.
J. C. Harsanyi, “ Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points ”, Manag. Sci., vol. 14, no 5, p. 320?334, janv. 1968, doi: 10.1287/mnsc.14.5.320.
32.
A. Anwar, T. Halabi, et M. Zulkernine, “ Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory ”, Internet Things, vol. 20, p. 100631, 2022.
33.
A. Behfarnia et A. Eslami, “ Misbehavior detection in ephemeral networks: A local voting game in presence of uncertainty ”, IEEE Access, vol. 7, p. 184629?184642, 2019.