Chapter 17
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks
A. I. Khan, A. H. Muhamad Amin, and R. A. Raja Mahmood
Clayton School of Information Technology, Monash University, Clayton, Victoria, Australia
17.3 Hierarchical Graph Neuron
17.4 Case Study I: DHGN for Pattern Recognition
17.5 Case Study II: GN for Threat Detection in WSN
Get Mobile Intelligence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.