UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs Journal article
Gu, Ke, Dong, Xin Ying, Jia, Wei Jia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2), 1215-1232.
Authors:  Gu, Ke;  Dong, Xin Ying;  Jia, Wei Jia
Favorite | TC[WOS]:30 TC[Scopus]:28  IF:5.3/4.6 | Submit date:2022/08/05
Data Security  Fog Computing  Malicious Node  Reputation  Vanets  
Pseudonym inference in cooperative vehicular traffic scenarios Conference paper
Chu X., Ruan N., Li M., Jia W.. Pseudonym inference in cooperative vehicular traffic scenarios[C], 2018.
Authors:  Chu X.;  Ruan N.;  Li M.;  Jia W.
Favorite | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/04/04
Location Privacy  Mix-zone  Vehicle Platoon  Vehicular Ad-hoc Networks (Vanets)