Sign in

Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks.

Umesh K. RautL. K. Vishwamitra
Published in: Int. J. Pervasive Comput. Commun. (2023)
Keyphrases
  • computational complexity
  • security analysis
  • real time
  • digital libraries
  • software engineering
  • source code
  • smart card
  • distributed environment
  • security requirements