共 10 条
[1]
[Anonymous], 102893 ETSI TR
[2]
Gazdar T., 2012, 2012 International Conference on Communications and Information Technology (ICCIT), P180, DOI 10.1109/ICCITechnol.2012.6285787
[3]
Harding J., 2014, READINESS OF V2V TEC
[4]
Hasrouny H, 2015, 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), P173, DOI 10.1109/DICTAP.2015.7113193
[5]
La V. H., 2014, International Journal on AdHoc Networking Systems (IJANS), V4, P1, DOI DOI 10.5121/IJANS.2014.4201
[6]
Patel N., 2015, TRUST BASED APPROACH
[7]
Raw R. S., 2013, Int. J. Netw. Secur. Appl., V5, P95, DOI DOI 10.5121/IJNSA.2013.5508
[8]
SESAR Joint Undertaking, 2013, 160203D03 SESAR JOIN
[9]
Yang NH, 2013, INT J FUTUR GENER CO, V6, P25