Defending method against jamming attack in wireless ad hoc networks.
Jalel Ben-OthmanAli HamiehPublished in: LCN (2009)
Keyphrases
- high accuracy
- pairwise
- significant improvement
- synthetic data
- cost function
- preprocessing
- classification method
- optimization algorithm
- support vector machine svm
- experimental evaluation
- dynamic programming
- similarity measure
- computational cost
- input data
- clustering method
- training set
- fully automatic
- optimization method