Reinforcement based Cognitive Algorithms to Detect Malicious Node in Wireless Networks (original) (raw)

Malicious Node Activity Monitoring using Cognition for Homogeneous and Heterogeneous Wireless Networks

L M Patnaik

View PDFchevron_right

Cognitive Model for Identification of Malicious Sensor Node Behavior 1

Devaraj Verma C

2016

View PDFchevron_right

Application of reinforcement learning for security enhancement in cognitive radio networks

Junaid Qadir

Applied Soft Computing, 2015

View PDFchevron_right

IJERT-Detection of Malicious Nodes in Densely Populated Wireless Sensor Network Using Mobile Agents

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

Detecting Attacks in Wireless Sensor Networks Using Fuzzy Q-Learning

Radhika Baskar

2017

View PDFchevron_right

Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence

mahmoud zaher

View PDFchevron_right

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Kaliappan M.

View PDFchevron_right

A Well Structured Rule through Reinforcement Learning for Wireless Sensor Networks Security

Dr. Anil Rose

nguyendangbinh.org

View PDFchevron_right

Intelligent CW Selection Mechanism Based on Q-Learning (MISQ)

Yacine SLIMANI

Ingénierie des systèmes d information, 2020

View PDFchevron_right

Reinforcement Learning for Intrusion Detection and Improving Optimal Route by Cuckoo Search in WSN

madhuri kanala

Indian Journal of Computer Science and Engineering, 2021

View PDFchevron_right

A DETAILED SURVEY ON MALICIOUS NODE DETECTION AND MITIGATION IN LARGE SCENARIO WIRELESS NETWORKS

IJESRT Journal

View PDFchevron_right

Network Security: Artificial Intelligence method for Attack Detection (Survey Study

Seyyed Rohollah Mirhoseini

2020

View PDFchevron_right

SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE

Editor IJRET

View PDFchevron_right

Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks

Juliette Dromard

View PDFchevron_right

Wicked node detection in wireless ad-hoc network by applying supervised learning

Chitra Sabapathy, International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2024

View PDFchevron_right

Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks

Vala Ali Rohani

Journal of Network and Computer Applications, 2014

View PDFchevron_right

Wireless Node Behavior Based Intrusion Detection Using Genetic Algorithm

Kishore raja 2001

2007

View PDFchevron_right

Selfish Attack Detection in Cognitive Ad-Hoc Network

International Journal IJRITCC

View PDFchevron_right

A hybrid approach for misbehavior detection in wireless ad-hoc networks

Sankalp Balachandran

2006

View PDFchevron_right

Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks

om pandey

2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013

View PDFchevron_right

Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion Detection System

The Ijes The Ijes

View PDFchevron_right

malicious node detection

Ram Subramanian

View PDFchevron_right

Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

L M Patnaik

View PDFchevron_right

Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues

Roshani Raut

Security and Communication Networks

View PDFchevron_right

Intrusion Detection System to Detect True Malicious Nodes in Wireless Sensor Network

Prajapati Bhavin

International Journal of Advance Engineering and Research Development, 2015

View PDFchevron_right

A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents

Nooruldeen Qader

IEIE Transactions on Smart Processing & Computing

View PDFchevron_right

A Learning Method for Secondary Users to minimize the effect of Jamming in Cognitive Radio Wireless Sensor-Networks State of the art in CR-WSN security

Bacar Mané

International Journal for Research in Applied Science and Engineering Technology, 2018

View PDFchevron_right

Reinforcement Learning for IoT Security: A Comprehensive Survey

aashma uprety

IEEE Internet of Things Journal, 2021

View PDFchevron_right

An efficient reinforcement learning-based Botnet detection approach

Prof. Mouhammd Al-kasassbeh

View PDFchevron_right

A Novel Approach towards the Detection of Malicious Nodes in Mobile Ad Hoc Networks

Shital Mali

2015

View PDFchevron_right

Efficient Selfish Attack Detection in Cognitive Radio Network

amrita janardhanan

Wireless Engineering and Technology, 2016

View PDFchevron_right

Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System

Sudaroli Vijayakumar

Computer and Information Science

View PDFchevron_right

Neural Network Based Approach for Malicious Node Detection in Wireless Sensor Networks

Tomasz Bednarz, Octavian Bass

View PDFchevron_right

Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues

Paul Teal

2012

View PDFchevron_right

A SURVEY OF INTRUSION DETECTION WITH HIGHER MALICIOUS MISBEHAVIOR DETECTION IN MANET, selfish behavior and Mobile Adhoc Networks (MANET

IAEME Publication

View PDFchevron_right