Author:
Liang Junwei,Ma Maode,Sadiq Muhammad,Yeung Kai-Hau
Subject
Artificial Intelligence,Information Systems and Management,Management Information Systems,Software
Reference48 articles.
1. Security of Self-organizing Networks: MANET, WSN, WMN, VANET;Pathan,2016
2. Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm;Taherkhani;IEEE Trans. Intell. Transp. Syst.,2016
3. Detecting road events using distributed data fusion: experimental evaluation for the icy roads case;Radak;IEEE Trans. Intell. Transp. Syst.,2016
4. False Attack. [Online]. Available: https://en.wiktionary.org/wiki/falseattack, Accessed on: 05.05.16.
5. J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis & defenses, in: Proc. of the Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, 2004, pp. 259–268.
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献