Login / Signup

Modeling and verification tools for jamming attacks in VANETs.

Jalel Ben-OthmanLynda Mokdad
Published in: GLOBECOM (2014)
Keyphrases
  • software tools
  • end users
  • case study
  • software engineering
  • user friendly
  • formal methods
  • data sets
  • formal verification
  • cryptographic protocols
  • java card
  • traffic analysis