Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper Academic Article uri icon

start page

  • 18273

end page

  • 18287

volume

  • 23

issue

  • 10