Author:
Nagalakshmi T.J.,Gnanasekar A.K.,Ramkumar G.,Sabarivani A.
Reference30 articles.
1. Farooq Anjum, Petros Mouchtaris, “Security for wireless adhoc networks, Wiley publications”, 2007.
2. Chie-Hong Lee, Yann-Yean Su, Machine learning based network intrusion detection, IEEE Int. Conf. Comput. Intell. Appl. 2017.
3. The application on intrusion detection based on K-means cluster algorithm;Jianliang;Int. J. Comput. Appl.,2009
4. D. Wood, J.A. Stankovic, Denial of service in sensor networks, Computer 35(10) 2002.
5. G. Ramkumar ,E. Logashanmugam, An effectual face tracking based on transformed algorithm using composite mask, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2016.
Cited by
65 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A YANG-Aided Unified Strategy for Black Hole Detection for Backbone Networks;ICC 2024 - IEEE International Conference on Communications;2024-06-09
2. Enhancement of Attacks Prediction on Cloud Computing using ResNet 50 Algorithm;2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT);2024-05-02
3. Enhancing the Energy and Improving Performance over Wireless Network Communication using NOMA Functionality;2024 1st International Conference on Innovative Sustainable Technologies for Energy, Mechatronics, and Smart Systems (ISTEMS);2024-04-26
4. Robust Methodology Design to Detect Anomalies Over Wireless Sensor Networks Using Predictive Learning Strategy;2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM);2024-04-04
5. Exploring the Potential of Block Chain Technology in Supply Chain Management;2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM);2024-04-04