Sign in

Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs.

Ke GuXinYing DongWeijia Jia
Published in: IEEE Trans. Cloud Comput. (2022)
Keyphrases
  • network topology
  • data sets
  • detection scheme
  • data sources
  • network structure
  • data analysis
  • digital libraries