Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the. Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. PDF | Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology.
|Published (Last):||5 October 2017|
|PDF File Size:||10.32 Mb|
|ePub File Size:||19.51 Mb|
|Price:||Free* [*Free Regsitration Required]|
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. | BibSonomy
CiteULike: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
This paper has highly influenced 29 other papers. Include unauthenticated results too may include “spam” Enter a search phrase.
Likes beta This copy of the article hasn’t been liked by anyone yet. CiteULike organises scholarly or academic papers or literature and provides bibliographic which means it makes bibliographies for universities and higher education establishments.
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
Robust regression and outlier-detection for combustion engine measurements H. Setup a permanent sync to delicious.
The service is similar in scope to EndNote or RefWorks or any other reference manager like BibTeX, but it is a social bookmarking service for scientists and humanities researchers. Topics Discussed in This Paper. You may hide this message.
Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Some citation styles add the source URL, which you may not want. However, security misbwhaving a critical factor and a significant challenge to be met. People studying for PhDs or in postdoctoral postdoc positions.
Showing of 33 references. Citations Publications citing this paper. Semantic Nodee estimates that this publication has citations based on the available data. Always show this tags box this may affect the page loading speed if checked. From This Paper Figures, tables, and topics from this paper. Brought to you by AQnowledgeprecision products for scientists. Register and you can start organising your references online.
Citation Statistics Citations 0 20 40 ’09 ’12 ’15 ‘ Cryptographic processors — A survey. CiteULike is a free online bibliography manager. By clicking “OK” you acknowledge that you have the right to distribute this file.
Showing of extracted citations. To insert individual citation into a bibliography in a word-processor, select your preferred citation style below and drag-and-drop it into the document. This ndoes has citations.
An application of information theory to intrusion detection.