Login / Signup
Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper.
Badis Hammi
Yacine Mohamed Idir
Sherali Zeadally
Rida Khatoun
Jamel Nebhen
Published in:
IEEE Trans. Intell. Transp. Syst. (2022)
Keyphrases
</>
malicious users
detection mechanism
automatic detection
detection method
network attacks
detecting malicious
dynamic environments
intrusion detection
future directions
countermeasures
computer security
traffic analysis
detect malicious
database
normal traffic
security threats
web services
real world