{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:36:31Z","timestamp":1768073791640,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647851","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Exploring InterferenceAware Spectrum Allocation in 6G Cellular Networks using dynamic resource Sharing Algorithm"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6779-6467","authenticated-orcid":false,"given":"Logeshwaran","family":"Jaganathan","sequence":"first","affiliation":[{"name":"Department of ECE, Sri Eshwar College of Engineering,, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6578-3956","authenticated-orcid":false,"given":"S","family":"Dhanasekaran","sequence":"additional","affiliation":[{"name":"Electronics and Communication Engineering, Sri Eshwar College of Engineering, Coimbatore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0039-4682","authenticated-orcid":false,"given":"Praveen","family":"Kantha","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering, School of Engineering and Technology, Chitkara University, Himachal Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6720-8322","authenticated-orcid":false,"given":"Amit","family":"Garg","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23125649"},{"key":"e_1_3_2_1_2_1","unstructured":"Sanusi I. O. (2023). Radio resource management techniques for industrial IoT in 5G-and beyond networks (Doctoral dissertation University of Greenwich)."},{"key":"e_1_3_2_1_3_1","volume-title":"A survey on how network simulators serve reinforcement learning in wireless networks. Computer Networks, 109934","author":"Ergun S.","year":"2023","unstructured":"Ergun, S., Sammour, I., & Chalhoub, G. (2023). A survey on how network simulators serve reinforcement learning in wireless networks. Computer Networks, 109934."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers12080158"},{"key":"e_1_3_2_1_5_1","volume-title":"Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue","author":"Durgesh","year":"2019","unstructured":"Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, \u201cPerformance Evaluation of Entropy Based Graph Network Intrusion Detection System (E-Ids)\u201d, in Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue, 2019"},{"key":"e_1_3_2_1_6_1","volume-title":"International Journal of Emerging Technology and Advanced Engineering","volume":"8","author":"Durgesh Dr.","year":"2018","unstructured":"Durgesh Srivastava, Nachiket Sainis and Dr. Rajeshwar Singh, \u201cClassification of various Dataset for Intrusion Detection System\u201d, in International Journal of Emerging Technology and Advanced Engineering, Volume 8, Issue 1, January 2018."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.07.012"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.07.015"},{"key":"e_1_3_2_1_9_1","volume-title":"Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks. arXiv preprint arXiv:2301.03201","author":"Gargari A. A.","year":"2023","unstructured":"Gargari, A. A., Ortiz, A., Pagin, M., Klein, A., Hollick, M., Zorzi, M., & Asadi, A. (2023). Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks. arXiv preprint arXiv:2301.03201."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/15501329221132496"},{"key":"e_1_3_2_1_11_1","unstructured":"Durgesh Srivastava Rajeshwar Singh Vikram Singh \u201cAn Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)\u201d in Journal of Advancements in Robotics. 2019; 6(1): 18\u201324p"},{"key":"e_1_3_2_1_12_1","volume-title":"International Journal Of Computer Sciences And Engineering 7(5):757-764","author":"Durgesh","year":"2019","unstructured":"Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, \u201cAnalysis of different Hybrid methods for Intrusion Detection System,\u201d International Journal Of Computer Sciences And Engineering 7(5):757-764, May 2019"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/drones7050322"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3209368"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103737"},{"key":"e_1_3_2_1_16_1","volume-title":"Research Article 5G-Telecommunication Allocation Network Using IoT Enabled Improved Machine Learning Technique","author":"Alzaidi M. S.","year":"2022","unstructured":"Alzaidi, M. S., Subbalakshmi, C., Roshini, T. V., Shukla, P. K., Shukla, S. K., Dutta, P., & Alhassan, M. (2022). Research Article 5G-Telecommunication Allocation Network Using IoT Enabled Improved Machine Learning Technique."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5439"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.33564\/IJEAST.2022.v06i09.011"},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"251","article-title":"AICSA-an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks","volume":"3","author":"Logeshwaran J.","year":"2021","unstructured":"Logeshwaran, J. (2021). AICSA-an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks. ICTACT Journal on Data Science and Machine Learning, 3(1), 251-253.","journal-title":"ICTACT Journal on Data Science and Machine Learning"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03043-4"},{"key":"e_1_3_2_1_21_1","volume-title":"A novel partial sequence technique based chaotic biogeography optimization for PAPR reduction in Generalized frequency division multiplexing waveform. Heliyon","author":"Xue X.","year":"2023","unstructured":"Xue, X., Palanisamy, S., Manikandan, A., Selvaraj, D., Khalaf, O. I., & Abdulsahib, G. (2023). A novel partial sequence technique based chaotic biogeography optimization for PAPR reduction in Generalized frequency division multiplexing waveform. Heliyon."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Maakar Sunil Kr Manju Khurana Chinmay Chakraborty Deepak Sinwar and Durgesh Srivastava. \"Performance evaluation of AODV and DSR routing protocols for flying ad hoc network using highway mobility model.\" Journal of Circuits Systems and Computers 31 no. 01 (2022): 2250008.","DOI":"10.1142\/S0218126622500086"},{"key":"e_1_3_2_1_23_1","volume-title":"AIP Publishing","author":"Sheenam","year":"2022","unstructured":"Sheenam, and Durgesh Srivastava. \"Dwindling of interference by adopting MRMC technique in WMN.\" In AIP Conference Proceedings, vol. 2576, no. 1. AIP Publishing, 2022."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3253870"},{"key":"e_1_3_2_1_25_1","volume-title":"Reinforcement learning in the sky: A survey on enabling intelligence in ntn-based communications","author":"Naous T.","year":"2023","unstructured":"Naous, T., Itani, M., Awad, M., & Sharafeddine, S. (2023). Reinforcement learning in the sky: A survey on enabling intelligence in ntn-based communications. IEEE Access."},{"key":"e_1_3_2_1_26_1","first-page":"104964","volume-title":"Microprocessors and Microsystems","author":"Srivastava D.","unstructured":"Srivastava, D., Singh, R., Chakraborty, C., Kumar, S., Makkar, A. and Sinwar, D., 2023. A Framework for Detection of Cyber Attacks by the Classification of Intrusion Detection Datasets. Microprocessors and Microsystems, p.104964."},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"2023 International Conference on IoT, Communication and Automation Technology (ICICAT)","author":"Sharma","year":"2023","unstructured":"Sharma, Vaibhav, Lekha Rani, and Durgesh Srivastava. \"Prediction of Coronavirus Using Various Machine Learning Algorithms.\" In 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), pp. 1-6. IEEE, 2023."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"2023 International Conference on IoT, Communication and Automation Technology (ICICAT)","author":"Anand","year":"2023","unstructured":"Anand, Ayush, Durgesh Srivastava, and Lekha Rani. \"Anomaly Detection and Time Series Analysis.\" In 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), pp. 1-5. IEEE, 2023."}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","location":"Jaipur India","acronym":"ICIMMI 2023"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:28:37Z","timestamp":1758216517000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":28,"alternative-id":["10.1145\/3647444.3647851","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647851","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}