Login / Signup

An Implementation and Evaluation of the Security Features of RPL.

Pericle PerazzoCarlo VallatiAntonio ArenaGiuseppe AnastasiGianluca Dini
Published in: ADHOC-NOW (2017)
Keyphrases
  • feature extraction
  • feature vectors
  • low level
  • data sets
  • intrusion detection
  • neural network
  • access control
  • operating system
  • classification method
  • structural information