Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the. Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. PDF | Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology.
|Published (Last):||20 November 2004|
|PDF File Size:||7.46 Mb|
|ePub File Size:||14.51 Mb|
|Price:||Free* [*Free Regsitration Required]|
Setup a permanent sync to delicious. To insert individual citation into a bibliography in a word-processor, select your preferred citation style below and drag-and-drop it into the document.
An application evitcion information theory to intrusion detection. Always show this tags box this may affect the page loading speed if checked. This paper has highly influenced 29 other papers. Likes beta This copy of the article hasn’t been liked by anyone yet. You may hide this message. Find this article at Save current location: Semantic Scholar estimates that this publication has citations based on the available data.
Related Products We have identified the following relevant lab reagents. Home Citegeist Everyone’s Library. Include unauthenticated results too may include “spam” Enter a search phrase. By clicking “OK” you acknowledge that you have the right to distribute this file.
We will interpret your continued use of this site as your acceptance of our missbehaving of cookies. CiteULike is a free online bibliography manager. The service is similar in scope to EndNote or RefWorks or any other reference manager like BibTeX, but it is a social bookmarking service for scientists and humanities researchers.
Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment.
Skip to search form Skip to main content. Some citation styles add the source URL, which you may not want. There are no reviews of this article.
Brought to you by AQnowledgeprecision products for scientists. Export in format suitable for direct import into delicious. People studying for PhDs or in postdoctoral postdoc positions. Topics Discussed in This Paper.
Showing of extracted citations. From This Paper Figures, tables, and topics from this paper. You can also specify a CiteULike article id.
Groups Connections Recommendations Neighbours Watchlist. Showing of 33 references. Volatile memory Search for additional papers on this topic.
Citation Statistics Citations 0 20 40 ’09 ’12 ’15 ‘ Search all the public and authenticated articles in CiteULike. It helps undergraduates and postgraduates.
Cooperative attack and defense in distributed networks Tyler Moore