Login / Signup
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
Zhen Hong
Rui Wang
Shouling Ji
Raheem Beyah
Published in:
IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
</>
location privacy
real time
location based services
location information