Release Time:2019-03-12 Hits:
Indexed by: Conference Paper
Date of Publication: 2016-01-01
Page Number: 128-135
Prev One:基于禁忌搜索的交叉路口自治车辆调度方法
Next One:IA(2)P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs