Login / Signup

IoT authentication model with optimized deep Q network for attack detection and mitigation.

Supriya PalekarY. Radhika
Published in: Int. J. Intell. Robotics Appl. (2022)
Keyphrases
  • data analysis
  • wireless sensor networks
  • data processing
  • attack detection