T Poongothai, K Duraiswamy - International Conference on …, 2014 - ieeexplore.ieee.org
… In this paper, we propose a novel anomaly detection method using two machinelearning techniques … “Intrusion detection in wirelessadhocnetworks”. IEEE Transactions on Wireless …
… In mobile adhocnetworks, nodes synchronize to each other for … to apply machinelearning to complications in adhocnetworks … machinelearning approaches for use in wirelessadhoc …
B Russell, ML Littman, W Trappe - International Journal of …, 2011 - Wiley Online Library
… This paper presents a cross-layer predictor for route selection in wirelessadhocnetworks that combines the effects of noise and router congestion into a single time-based routing …
… notions of machinelearning techniques. Then, by adopting a bottom-up approach, we examine existing work on machinelearning for the IoT at the physical, data-link and network layer …
Z Zheng, S Jiang, R Feng, L Ge, C Gu - Entropy, 2023 - mdpi.com
… In this paper, we conduct a survey of the literature about reinforcementlearning (RL)-based medium access control (MAC) protocols. As the scale of the wirelessadhocnetwork (…
M Abdan, SAH Seno - Wireless Communications and Mobile …, 2022 - Wiley Online Library
… threat base on machinelearning methods. The classification is performed with several ways of machinelearning consisting of K-nearest neighbor (KNN), support vector machine (SVM), …
S Leng, A Yener - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
… AoI in a wirelessadhocnetwork. Although wirelessadhocnetworks have been studied … We investigate a wirelessadhocnetwork consisting of K fully-connected nodes as in Fig. 1. …
… -hocnetwork as by providing the suitable environment to the routing protocols to make them … , various types of Machinelearning applied on different wirelessAd-hocnetwork are studied …
… Ad-hocnetwork is used to set up a wireless connection directly from one device to another computer device. This network is a decentralised network. … But, the main drawback of Adhoc …