Attacks Detection Approach Based on a Reinforcement Learning Process to Secure 5G Wireless Network.
Hichem SedjelmaciPublished in: ICC Workshops (2020)
Keyphrases
- wireless networks
- learning process
- ad hoc networks
- secure routing
- wireless communication
- reinforcement learning
- cryptographic protocols
- wireless networking
- mobile computing
- security mechanisms
- low bandwidth
- base station
- multi hop
- security protocols
- stream cipher
- access points
- wifi
- learning algorithm
- chosen plaintext
- cellular networks
- key management
- mobile communications
- security issues
- e learning
- network infrastructure
- anomaly detection
- wireless local area network
- wireless sensor networks