ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
3
views
0
references
Top references
cited by
6
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,898
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
A survey of local/cooperative-based malicious information detection techniques in VANETs
Author(s):
M. ARSHAD
,
Z. Ullah
,
N AHMAD
,
M. Khalid
,
H. Criuckshank
,
Y. CAO
,
Muhammad Arshad
,
Zahid Ullah
,
Naveed Ahmad
,
Muhammad Khalid
,
Haithiam Criuckshank
,
Yue Cao
,
M Arshad
,
Z. ULLAH
,
N Ahmad
,
M. KHALID
Publication date:
2018
Journal:
J Wireless Com Network
Read this article at
ScienceOpen
Publisher
Further versions
oa journal (via doaj)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Recursive Rule based Visual Categorization
Author and article information
Journal
DOI::
10.1186/s13638-018-1064-y
ScienceOpen disciplines:
Uncategorized
Data availability:
ScienceOpen disciplines:
Uncategorized
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,898
V2V protocols for traffic congestion discovery along routes of interest in VANETs: a quantitative study
Authors:
Giuseppe Martuscelli
,
Azzedine Boukerche
,
Luca Foschini
…
Host revocation authority: A way of protecting mobile agents from malicious hosts
Authors:
A Hybrid Malicious Code Detection Method based on Deep Learning
Authors:
Yuancheng Li
,
Rong Ma
,
Runhai Jiao
See all similar
Cited by
6
Securing Vehicle-to-Everything (V2X) Communication Platforms
Authors:
Monowar Hasan
,
Sibin Mohan
,
Takayuki Shimizu
…
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges
Authors:
Rodolfo Meneguette
,
Robson De Grande
,
Jo Ueyama
…
Beacon trust management system and fake data detection in vehicular ad-hoc networks
Authors:
Muhammad ARSHAD
,
Zahid Ullah
,
Muhammad Khalid
…
See all cited by