Login / Signup
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs.
Ke Gu
XinYing Dong
Weijia Jia
Published in:
IEEE Trans. Cloud Comput. (2022)
Keyphrases
</>
network topology
data sets
detection scheme
data sources
network structure
data analysis
digital libraries