[1]
P. V. . Sontakke and N. B. . Chopade, “Design a Process to Detect and Mitigate the Malicious Attacks in VANET Using Ml Approach”, Int J Intell Syst Appl Eng, vol. 12, no. 19s, pp. 106–117, Mar. 2024.