Figure 2From: Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks Example of attacker mobility path. Back to article page