Handling Jamming Attacks in a LoRa Network.
Md Ashikul HaqueAbusayeed SaifullahPublished in: IoTDI (2024)
Keyphrases
- traffic analysis
- agent technology
- security threats
- wireless sensor networks
- network structure
- machine learning
- information technology
- network anomaly detection
- sensor networks
- network intrusion
- computer networks
- network model
- cyber attacks
- buffer overflow
- network attacks
- fault injection
- ddos attacks
- network management
- community structure
- network traffic
- complex networks
- anomaly detection
- peer to peer
- decision making