Login / Signup
A methodical examination of single and multi-attacker flood attacks using RPL-based approaches.
Serkan Gönen
Published in:
Comput. Ind. Eng. (2024)
Keyphrases
</>
strengths and weaknesses
neural network
data mining
genetic algorithm
artificial intelligence
information systems
image segmentation
database systems
relational databases
machine learning algorithms