Login / Signup
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs.
Mohamed Baza
Mahmoud Nabil
Mohamed M. E. A. Mahmoud
Niclas Bewermeier
Kemal Fidan
Waleed Alasmary
Mohamed Abdallah
Published in:
IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
</>
malicious users
countermeasures
network intrusion detection systems
malicious activities
automatic detection
watermarking scheme
attack detection
detecting malicious
intrusion detection
dos attacks
security threats
security risks
malicious attacks
identity theft
malicious nodes
equational theories