Login / Signup
Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET.
Ikjot Saini
Sherif Saad
Arunita Jaekel
Published in:
ISDDC (2018)
Keyphrases
</>
information security
neural network
vehicular ad hoc networks
processing capabilities
computational power
real time
machine learning
artificial intelligence
image processing
data management
security vulnerabilities