Login / Signup

A methodical examination of single and multi-attacker flood attacks using RPL-based approaches.

Serkan Gönen
Published in: Comput. Ind. Eng. (2024)
Keyphrases
  • strengths and weaknesses
  • neural network
  • data mining
  • genetic algorithm
  • artificial intelligence
  • information systems
  • image segmentation
  • database systems
  • relational databases
  • machine learning algorithms