Sign in

Securing CACC: Strategies for Mitigating Data Injection Attacks.

Michael WolfAlexander WilleckeJohannes-Christian MüllerKeno GarlichsThomas GriebelLars C. WolfMichael BuchholzKlaus DietmayerRens W. van der HeijdenFrank Kargl
Published in: VNC (2020)
Keyphrases
  • database
  • data collection
  • data sources
  • knowledge discovery
  • injection attacks
  • databases
  • data mining techniques