Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the. Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. PDF | Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology.
|Published (Last):||16 September 2004|
|PDF File Size:||14.84 Mb|
|ePub File Size:||16.99 Mb|
|Price:||Free* [*Free Regsitration Required]|
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. | BibSonomy
Groups Connections Recommendations Neighbours Watchlist. CiteULike organises scholarly or academic papers or literature and provides bibliographic which means it makes bibliographies for universities and higher education establishments. Volatile memory Search for additional papers on this topic.
However, security is a critical factor and a significant challenge to be met. There are no reviews of this article. The service is similar in scope to EndNote or RefWorks or any other reference manager like BibTeX, but it is a social bookmarking service for scientists and humanities researchers. References Publications referenced by this paper. Showing of extracted citations. Citation Statistics Citations 0 20 40 ’09 ’12 ’15 ‘ Semantic Scholar estimates that this publication vehicilar citations based on the available data.
Home Citegeist Everyone’s Library. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment.
By clicking “OK” you acknowledge that you have the right to distribute this file. See our FAQ for additional information.
Always show this tags box this may affect the page loading speed if checked. Search all the public and authenticated articles in CiteULike.
Some citation styles add the source URL, which you may not want. Likes beta This copy of the article hasn’t been liked by anyone yet. Cooperative attack and defense in distributed networks Tyler Moore Export in format suitable for direct import into delicious.
An application of information theory to intrusion detection.
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
Showing of 33 references. This paper has highly influenced 29 other papers. Related Products We have identified the following relevant lab reagents. People studying for PhDs or in postdoctoral postdoc positions. Cryptographic processors — A survey.
You can also specify a CiteULike article id. CiteULike is a free online bibliography manager.