Login / Signup
IoT authentication model with optimized deep Q network for attack detection and mitigation.
Supriya Palekar
Y. Radhika
Published in:
Int. J. Intell. Robotics Appl. (2022)
Keyphrases
</>
data analysis
wireless sensor networks
data processing
attack detection