共 30 条
[1]
Abassi R., 2018, P 13 INT C AVAILABIL, P1
[3]
Celes AA, 2018, PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), P388, DOI 10.1109/ICCSP.2018.8524540
[5]
Cunha AL, 2009, LECT NOTES ARTIF INT, V5816, P3, DOI 10.1007/978-3-642-04686-5_1
[6]
Finck M., 2018, Eur. Data Prot. Law Rev, V4, P17, DOI [DOI 10.21552/EDPL/2018/1/6, 10.21552/edpl/2018/1/6]
[8]
Edge Computing-Based Security Framework for Big Data Analytics in VANETs
[J].
IEEE NETWORK,
2019, 33 (02)
:72-81
[9]
Gayathri M., 2021, J Crit Rev, V8, P1029
[10]
A Reputation Management Scheme for Identifying Malicious Nodes in VANET
[J].
2019 IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR),
2019,