Attacker Placement for Detecting Vulnerabilities of Pseudonym Change Strategies in VANET | IEEE Conference Publication | IEEE Xplore