Login / Signup
An anomalous co-operative trust & PG-DRL based vampire attack detection & routing.
Vikas Juneja
Shail Kumar Dinkar
Dharam Vir Gupta
Published in:
Concurr. Comput. Pract. Exp. (2022)
Keyphrases
</>
attack detection
cooperative
multistage
anomaly detection
intrusion detection system
trust model
ad hoc networks
routing protocol
cyber attacks
intrusion detection
computer networks
attack scenarios
sufficient conditions