Login / Signup
Attacker Placement for Detecting Vulnerabilities of Pseudonym Change Strategies in VANET.
Ikjot Saini
Sherif Saad Ahmed
Arunita Jaekel
Published in:
VTC Fall (2018)
Keyphrases
</>
attack graphs
attack graph
attack scenarios
database
databases
real world
expert systems
optimal strategy
security issues
security mechanisms
selection strategies
optimization strategies
security risks
security vulnerabilities