{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T10:02:56Z","timestamp":1770458576449,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T00:00:00Z","timestamp":1613606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T00:00:00Z","timestamp":1613606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08277-7","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T16:49:23Z","timestamp":1613753363000},"page":"479-503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks"],"prefix":"10.1007","volume":"127","author":[{"given":"K.","family":"Lakshmi Narayanan","sequence":"first","affiliation":[]},{"given":"R.","family":"Santhana Krishnan","sequence":"additional","affiliation":[]},{"given":"E.","family":"Golden Julie","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Harold Robinson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1467-1206","authenticated-orcid":false,"given":"Vimal","family":"Shanmuganathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"8277_CR1","doi-asserted-by":"publisher","unstructured":"Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, Maui, HI, USA (Vol. 2). https:\/\/doi.org\/10.1109\/HICSS.2000.926982.","DOI":"10.1109\/HICSS.2000.926982"},{"key":"8277_CR2","doi-asserted-by":"publisher","unstructured":"Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings, IEEE Aerospace conference, Big Sky, MT, USA. https:\/\/doi.org\/10.1109\/AERO.2002.1035242.","DOI":"10.1109\/AERO.2002.1035242"},{"key":"8277_CR3","doi-asserted-by":"publisher","unstructured":"Manjeshwar, A., & Agrawal, D. P. (2001). TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In Proceedings 15th international parallel and distributed processing symposium. IPDPS 2001, San Francisco, CA, USA (pp. 2009\u20132015). https:\/\/doi.org\/10.1109\/IPDPS.2001.925197.","DOI":"10.1109\/IPDPS.2001.925197"},{"key":"8277_CR4","doi-asserted-by":"publisher","unstructured":"Manjeshwar, A., & Agrawal, D. P. (2002). APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless. In Proceedings 16th international parallel and distributed processing symposium, Ft. Lauderdale, FL. https:\/\/doi.org\/10.1109\/IPDPS.2002.1016600.","DOI":"10.1109\/IPDPS.2002.1016600"},{"key":"8277_CR5","doi-asserted-by":"publisher","unstructured":"Patel, M. A., & Patel, M. M. (2019). Wormhole attack detection in wireless sensor network. In 2018 IEEE international conference on inventive research in computing applications. https:\/\/doi.org\/10.1109\/ICIRCA.2018.8597366.","DOI":"10.1109\/ICIRCA.2018.8597366"},{"key":"8277_CR6","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1007\/s11276-019-02151-y","volume":"26","author":"R Santhana Krishnan","year":"2020","unstructured":"Santhana Krishnan, R., Golden Julie, E., Harold Robinson, Y., Kumar, R., Son, L. H., Tuan, T. A., & Long, H. V. (2020). Modified zone based intrusion detection system for security enhancement in mobile ad-hoc networks. Wireless Networks, 26, 1275\u20131289.","journal-title":"Wireless Networks"},{"issue":"5","key":"8277_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijcsit.2013.5501","volume":"5","author":"E Arreyouchi","year":"2013","unstructured":"Arreyouchi, E., Ghoumid, K., Ameziane, K., & ElMrabet, O. (2013). International Journal of Computer Science & Information Technology (IJCSIT), 5(5), 1\u201320.","journal-title":"International Journal of Computer Science & Information Technology (IJCSIT)"},{"key":"8277_CR8","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1007\/s11517-019-02036-4","volume":"57","author":"A Ayyanar","year":"2019","unstructured":"Ayyanar, A., Archana, M., Harold Robinson, Y., Golden Julie, E., Kumar, R., & Son, L. H. (2019). Design a prototype for automated patient diagnosis. Wireless Sensor Networks, Medical & Biological Engineering & Computing, 57, 2373\u20132387.","journal-title":"Wireless Sensor Networks, Medical & Biological Engineering & Computing"},{"key":"8277_CR9","doi-asserted-by":"crossref","unstructured":"Kaur, G., Jain, V. K., & Chaba, Y. (2017). Detection and prevention of blackhole attacks in wireless sensor networks. In International conference on intelligent, secure, and dependable systems in distributed and cloud environments (pp. 118\u2013126).","DOI":"10.1007\/978-3-319-69155-8_8"},{"key":"8277_CR10","doi-asserted-by":"publisher","first-page":"101962","DOI":"10.1016\/j.cose.2020.101962","volume":"97","author":"R Santhana Krishnan","year":"2020","unstructured":"Santhana Krishnan, R., Golden Julie, E., Harold Robinson, Y., Kumar, R., Thong, P. H., & Son, L. H. (2020). Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks. Computers & Security, 97, 101962.","journal-title":"Computers & Security"},{"key":"8277_CR11","doi-asserted-by":"crossref","unstructured":"Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. In 7th international conference on communication, computing and virtualization 2016 Published by Elsevier (pp. 700\u2013707).","DOI":"10.1016\/j.procs.2016.03.092"},{"key":"8277_CR12","doi-asserted-by":"publisher","first-page":"103358","DOI":"10.1016\/j.csi.2019.103358","volume":"66","author":"S Balaji","year":"2019","unstructured":"Balaji, S., Golden Julie, E., Harold Robinson, Y., Kumar, R., Thong, P. H., & Son, L. H. (2019). Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model. Computer Standards & Interfaces, 66, 103358.","journal-title":"Computer Standards & Interfaces"},{"issue":"8","key":"8277_CR13","first-page":"1176","volume":"3","author":"RB Pawar","year":"2014","unstructured":"Pawar, R. B., Patil, P. U., Bombale, G., & Zalani, A. (2014). Wormhole attack and it\u2019s variants in wireless sensor network: A survey. International Journal of Engineering Research & Technology, 3(8), 1176\u20131179.","journal-title":"International Journal of Engineering Research & Technology"},{"issue":"1","key":"8277_CR14","doi-asserted-by":"publisher","first-page":"233","DOI":"10.18576\/amis\/120123","volume":"12","author":"R Arun-Prakash","year":"2018","unstructured":"Arun-Prakash, R., Jeyaseelan, S., & Jayasankar, T. (2018). Detection, prevention and mitigation of wormhole attack in wireless adhoc network by coordinator. Applied Mathematics & Information Sciences, 12(1), 233\u2013237.","journal-title":"Applied Mathematics & Information Sciences"},{"issue":"4","key":"8277_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2017915376","volume":"174","author":"MO Johnson","year":"2017","unstructured":"Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174(4), 1\u20138.","journal-title":"International Journal of Computer Applications"},{"key":"8277_CR16","volume-title":"Advanced computing and communication technologies. Advances in intelligent systems and computing","author":"N Dutta","year":"2019","unstructured":"Dutta, N., & Singh, M. M. (2019). Wormhole attack in wireless sensor networks: A critical review. In J. Mandal, D. Bhattacharyya, & N. Auluck (Eds.), Advanced computing and communication technologies. Advances in intelligent systems and computing (Vol. 702). Singapore: Springer."},{"key":"8277_CR17","doi-asserted-by":"publisher","unstructured":"Yasin, A. & Zant, M. A. (2018). Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2018\/9812135.","DOI":"10.1155\/2018\/9812135"},{"key":"8277_CR18","volume-title":"Recent advances on soft computing and data mining. Advances in intelligent systems and computing","author":"KI Ghathwan","year":"2014","unstructured":"Ghathwan, K. I., & Yaakub, A. R. B. (2014). An Artificial intelligence technique for prevent black hole attacks in MANET. In T. Herawan, R. Ghazali, & M. Deris (Eds.), Recent advances on soft computing and data mining. Advances in intelligent systems and computing (Vol. 287). Berlin: Springer."},{"issue":"6","key":"8277_CR19","doi-asserted-by":"publisher","first-page":"114","DOI":"10.26438\/ijcse\/v6i6.11491156","volume":"6","author":"P Sarathe","year":"2018","unstructured":"Sarathe, P., & Shrivastava, N. (2018). A review on different methods to prevent Black Hole attack in MANET. International Journal of Computer Sciences and Engineering, 6(6), 114\u20131156.","journal-title":"International Journal of Computer Sciences and Engineering"},{"key":"8277_CR20","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1016\/j.procs.2018.04.297","volume":"131","author":"X Jinhui","year":"2018","unstructured":"Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yaoa, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science, 131, 1188\u20131195.","journal-title":"Procedia Computer Science"},{"key":"8277_CR21","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.comcom.2019.09.007","volume":"149","author":"R Bhatt","year":"2020","unstructured":"Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of Fruit Fly optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Computer Communications, 149, 134\u2013145.","journal-title":"Computer Communications"},{"issue":"15","key":"8277_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jnca.2018.03.023","volume":"112","author":"Z Sun","year":"2018","unstructured":"Sun, Z., Liu, Y., & Tao, Li. (2018). Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. Journal of Network and Computer Applications, 112(15), 29\u201340.","journal-title":"Journal of Network and Computer Applications"},{"key":"8277_CR23","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.procs.2019.01.028","volume":"148","author":"H Kalkha","year":"2019","unstructured":"Kalkha, H., Satori, H., & Satori, K. (2019). Preventing black hole attack in wireless sensor network using HMM. Procedia Computer Science, 148, 552\u2013561.","journal-title":"Procedia Computer Science"},{"issue":"15","key":"8277_CR24","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.eswa.2019.01.023","volume":"122","author":"J Parras","year":"2019","unstructured":"Parras, J., & Zazo, S. (2019). Learning attack mechanisms in wireless sensor networks using markov decision processes. Expert Systems with Applications, 122(15), 376\u2013387.","journal-title":"Expert Systems with Applications"},{"key":"8277_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, W., Li, P., Wang, Q., & Nabipour, N. (2020). Research on data transmission of wireless sensor networks based on symmetric key algorithm. Measurement, 153, Article 107454.","DOI":"10.1016\/j.measurement.2019.107454"},{"key":"8277_CR26","first-page":"158","volume":"23","author":"V Mohindru","year":"2019","unstructured":"Mohindru, V., Bhatt, R., & Singh, Y. (2019). Reauthentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 23, 158\u2013166.","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"8277_CR27","doi-asserted-by":"crossref","unstructured":"Fu, X., Yao, H., & Yang, Y. (2019). Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Networks, 93, Article 101900.","DOI":"10.1016\/j.adhoc.2019.101900"},{"key":"8277_CR28","doi-asserted-by":"crossref","unstructured":"L\u00f3pez, M., Peinado, A., & Ortiz, A. (2019). An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Computer Networks, 165, Article 106945.","DOI":"10.1016\/j.comnet.2019.106945"},{"key":"8277_CR29","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.comcom.2019.11.007","volume":"150","author":"B Nivedetha","year":"2020","unstructured":"Nivedetha, B., & Vennila, I. (2020). FFBKS: Fuzzy fingerprint biometric key based security schema for wireless sensor networks. Computer Communications, 150, 94\u2013102.","journal-title":"Computer Communications"},{"key":"8277_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3284-9_86","volume-title":"Intelligent computing and innovation on data science. Lecture Notes in Networks and Systems","author":"NA Khan","year":"2020","unstructured":"Khan, N. A., Brohi, S. N., & Jhanjhi, N. (2020). UAV\u2019s applications, architecture, security issues and attack scenarios: A survey. In S. L. Peng, L. Son, G. Suseendran, & D. Balaganesh (Eds.), Intelligent computing and innovation on data science. Lecture Notes in Networks and Systems (Vol. 118). Singapore: Springer. https:\/\/doi.org\/10.1007\/978-981-15-3284-9_86."},{"key":"8277_CR31","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.future.2019.11.043","volume":"105","author":"JEZ Gbadouissa","year":"2020","unstructured":"Gbadouissa, J. E. Z., Ari, A. A. A., Titouna, C., Gueroui, A. M., & Thiare, O. (2020). HGC: HyperGraph based clustering scheme for power aware wireless sensor networks. Future Generation Computer Systems, 105, 175\u2013183.","journal-title":"Future Generation Computer Systems"},{"key":"8277_CR32","doi-asserted-by":"crossref","unstructured":"Deebak, B.D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, Article 102022.","DOI":"10.1016\/j.adhoc.2019.102022"},{"key":"8277_CR33","doi-asserted-by":"crossref","unstructured":"Guo, H., Gao, Y., Xu, T., Zhang, X., & Ye, J. (2019). A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Networks, 95, Article 101965.","DOI":"10.1016\/j.adhoc.2019.101965"},{"key":"8277_CR34","doi-asserted-by":"crossref","unstructured":"Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Networks, 97, Article 102024.","DOI":"10.1016\/j.adhoc.2019.102024"},{"key":"8277_CR35","doi-asserted-by":"crossref","unstructured":"Santos-Gonz\u00e1lez, I., Rivero-Garc\u00eda, A., Burmester, M., Munilla, J., & Caballero-Gil, P. (2020). Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks. Information Systems, 88, Article 101423.","DOI":"10.1016\/j.is.2019.101423"},{"key":"8277_CR36","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.asoc.2019.01.034","volume":"77","author":"Z Sun","year":"2019","unstructured":"Sun, Z., Wei, M., Zhang, Z., & Gang, Qu. (2019). Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Applied Soft Computing, 77, 366\u2013375.","journal-title":"Applied Soft Computing"},{"key":"8277_CR37","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.ins.2018.06.017","volume":"476","author":"L Han","year":"2019","unstructured":"Han, L., Zhou, M., Jia, W., Dalil, Z., & Xingbo, Xu. (2019). Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information Sciences, 476, 491\u2013504.","journal-title":"Information Sciences"},{"key":"8277_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w","author":"TA Tuan","year":"2020","unstructured":"Tuan, T. A., Long, H. V., Son, L. H., Kumar, R., Priyadarshini, I., & Son, N. T. K. (2020). Performance evaluation of botnet DDoS attack detection using machine learning. Evolutionary Intelligence. https:\/\/doi.org\/10.1007\/s12065-019-00310-w.","journal-title":"Evolutionary Intelligence"},{"key":"8277_CR39","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.future.2019.08.007","volume":"102","author":"ZA Baig","year":"2020","unstructured":"Baig, Z. A., Sanguanpong, S., Firdous, S. N., Nguyen, T. G., & So-In, C. (2020). Averaged dependence estimators for DoS attack detection in IoT networks. Future Generation Computer Systems, 102, 198\u2013209.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"8277_CR40","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1016\/j.jesit.2017.02.002","volume":"5","author":"J Govindasamy","year":"2018","unstructured":"Govindasamy, J., & Punniakody, S. (2018). A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. Journal of Electrical Systems and Information Technology, 5(3), 735\u2013744.","journal-title":"Journal of Electrical Systems and Information Technology"},{"key":"8277_CR41","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.06.016","volume":"119","author":"H Mostafaei","year":"2018","unstructured":"Mostafaei, H., & Menth, M. (2018). Software-defined wireless sensor networks: A survey. Journal of Network and Computer Applications, 119, 42\u201356.","journal-title":"Journal of Network and Computer Applications"},{"key":"8277_CR42","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.future.2014.07.006","volume":"55","author":"C Benzaid","year":"2016","unstructured":"Benzaid, C., Lounis, K., Al-Nemrat, A., Badache, N., & Alazab, M. (2016). Fast authentication in wireless sensor networks. Future Generation Computer Systems, 55, 362\u2013375.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"8277_CR43","doi-asserted-by":"publisher","first-page":"2716","DOI":"10.1109\/TII.2019.2956474","volume":"16","author":"F Farivar","year":"2020","unstructured":"Farivar, F., Haghighi, M. S., Jolfaei, A., & Alazab, M. (2020). Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT. IEEE Transactions on Industrial Informatics, 16(4), 2716\u20132725. https:\/\/doi.org\/10.1109\/TII.2019.2956474.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"8277_CR44","doi-asserted-by":"publisher","first-page":"4436","DOI":"10.1109\/TIA.2020.2971952","volume":"56","author":"R Vinayakumar","year":"2020","unstructured":"Vinayakumar, R., Alazab, M., Srinivasan, S., Pham, Q., Padannayil, S. K., & Simran, K. (2020). A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Transactions on Industry Applications, 56(4), 4436\u20134456. https:\/\/doi.org\/10.1109\/TIA.2020.2971952.","journal-title":"IEEE Transactions on Industry Applications"},{"key":"8277_CR45","doi-asserted-by":"publisher","first-page":"85454","DOI":"10.1109\/ACCESS.2020.2991067","volume":"8","author":"M Alazab","year":"2020","unstructured":"Alazab, M., Khan, S., Krishnan, S. S. R., Pham, Q., Reddy, M. P. K., & Gadekallu, T. R. (2020). A Multidirectional LSTM model for predicting the stability of a smart grid. IEEE Access, 8, 85454\u201385463. https:\/\/doi.org\/10.1109\/ACCESS.2020.2991067.","journal-title":"IEEE Access"},{"key":"8277_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102096","author":"ZA Almusaylim","year":"2020","unstructured":"Almusaylim, Z. A., Alhumam, A., & Jhanjhi, N. Z. (2020). Proposing a secure RPL based internet of things routing protocol: A review. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102096.","journal-title":"Ad Hoc Networks"},{"key":"8277_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-020-07702-7","volume":"116","author":"SJ Hussain","year":"2021","unstructured":"Hussain, S. J., Irfan, M., Jhanjhi, N. Z., et al. (2021). Performance enhancement in wireless body area networks with secure communication. Wireless Personal Communications, 116, 1\u201322. https:\/\/doi.org\/10.1007\/s11277-020-07702-7.","journal-title":"Wireless Personal Communications"},{"key":"8277_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s12145-020-00478-1","author":"S Pasupathi","year":"2020","unstructured":"Pasupathi, S., Vimal, S., Harold-Robinson, Y., et al. (2020). Energy efficiency maximization algorithm for underwater mobile sensor networks. Earth Science Informatics. https:\/\/doi.org\/10.1007\/s12145-020-00478-1.","journal-title":"Earth Science Informatics"},{"key":"8277_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s12145-020-00538-6","author":"YH Robinson","year":"2020","unstructured":"Robinson, Y. H., Vimal, S., Julie, E. G., et al. (2020). Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater things. Earth Science Informatics. https:\/\/doi.org\/10.1007\/s12145-020-00538-6.","journal-title":"Earth Science Informatics"},{"issue":"1","key":"8277_CR50","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.comcom.2020.01.018","volume":"151","author":"S Vimal","year":"2020","unstructured":"Vimal, S., Khari, M., Dey, N., Crespo, R. G., & Robinson, Y. H. (2020). Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT. Computer Communications, 151(1), 355\u2013364.","journal-title":"Computer Communications"},{"issue":"12","key":"8277_CR51","first-page":"35","volume":"3","author":"S Vimal","year":"2016","unstructured":"Vimal, S., et al. (2016). Secure data packet transmission in MANET using enhanced identity-based cryptography. International Journal of New Technologies in Science and Engineering, 3(12), 35\u201342.","journal-title":"International Journal of New Technologies in Science and Engineering"},{"key":"8277_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3788-3","author":"S Vimal","year":"2018","unstructured":"Vimal, S., Kalaivani, L., Kaliappan, M., Suresh, A., Gao, X.-Z., & Varatharajan, R. (2018). Development of secured data transmission using machine learning based discrete time partial observed Markov model and energy optimization in cognitive radio networks. Neural Computing and Applications. https:\/\/doi.org\/10.1007\/s00521-018-3788-3.","journal-title":"Neural Computing and Applications"},{"key":"8277_CR53","doi-asserted-by":"publisher","unstructured":"Annamalai, S., Udendhran R., & Vimal, S. (2019). An intelligent grid network based on cloud computing infrastructures. In Novel practices and trends in grid and cloud computing (pp. 59\u201373). https:\/\/doi.org\/10.4018\/978-1-5225-9023-1.ch005.","DOI":"10.4018\/978-1-5225-9023-1.ch005"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08277-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08277-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08277-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T13:17:55Z","timestamp":1671023875000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08277-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,18]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8277"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08277-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,18]]},"assertion":[{"value":"4 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}