Sign in

P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs.

Nan DingGuozhen TanWei Zhang
Published in: Int. J. Distributed Sens. Networks (2016)
Keyphrases
  • data collection
  • data analysis
  • traffic flow
  • data processing
  • data sources
  • computer systems
  • traffic data
  • data mining
  • cellular automata
  • short term