2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications 2010
DOI: 10.1109/wimob.2010.5645020
|View full text |Cite
|
Sign up to set email alerts
|

Testing viability of relay policies for reactive CCA applications in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…There are some publications that focus on the testing of CCA algorithms and VANET protocols (see [14] or [13]), but none addresses the possibility of automated testing for security-related abuses. Additionally, our work appears to be alone in testing CCA algorithms with the presence of adversarial agents whose goal it is to subvert the proper function of the CCA system.…”
Section: Related Workmentioning
confidence: 99%
“…There are some publications that focus on the testing of CCA algorithms and VANET protocols (see [14] or [13]), but none addresses the possibility of automated testing for security-related abuses. Additionally, our work appears to be alone in testing CCA algorithms with the presence of adversarial agents whose goal it is to subvert the proper function of the CCA system.…”
Section: Related Workmentioning
confidence: 99%