the proposed framework efficiently monitors redundant information and avoids the inefficient use of communication bandwidth. It also controls the number of re-transmissions in the case of malicious actions and efficiently utilizes the network’s resources. Second, a trustworthy chain is built between ...
Albuquerque, F.C.; Casanova, M.A.; Lopes, H.; Redlich, L.R.; de Macedo, J.A.F.; Lemos, M.; Renso, C. A methodology for traffic-related Twitter messages interpretation. Comput. Ind. 2016, 78, 57–69. [Google Scholar] [CrossRef] Davis, C.A., Jr.; Pappa, G.L.; de Olive...