Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
By injection attack, the malicious data are injected into VANETs and disrupt ITS applications. For example, sending false traffic flow data to emulate traffic ...
Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 ...
Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 ...
Several studies investigating data validity and security against malicious data injection attacks in vehicular ad hoc networks (VANETs) have focused on ...
Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA2P ...
Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 ...
IA 2 P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs. Article. Full-text ...
Ia2p: intrusion-tolerant malicious data injection attack analysis and processing in traffic flow data collection based on vanets. Int. J. Distributed Sens ...
2016: IA2P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs International Journal ...
Ding, Ia2p: intrusion-tolerant malicious data injection attack analysis and processing in traffic flow data collection based on vanets, Int. J. Distributed ...