2020
DOI: 10.1109/tetc.2018.2801464
|View full text |Cite
|
Sign up to set email alerts
|

Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…Figures 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , and 20 , determined for Routing Protocols Communication for Rushing Attack concerning the routing communication with route projection for instance of "Attacker detection automation," Modified AODV and Hybrid Random Late Detection (HRLD), "Swift Implicit Response Round Trip Time" mechanism, "Use Best Approximation" and "Past Interaction History" [ 77 , 80 , 83 ].
Fig.
…”
Section: Routing Protocols Communication For Rushing Attacker Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…Figures 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , and 20 , determined for Routing Protocols Communication for Rushing Attack concerning the routing communication with route projection for instance of "Attacker detection automation," Modified AODV and Hybrid Random Late Detection (HRLD), "Swift Implicit Response Round Trip Time" mechanism, "Use Best Approximation" and "Past Interaction History" [ 77 , 80 , 83 ].
Fig.
…”
Section: Routing Protocols Communication For Rushing Attacker Detectionmentioning
confidence: 99%
“…Attacker detection automation of Bees Colony Optimization (ADABCP) was developed to overcome route optimization concerns on the MANET against rushing assaults. Route Organization and Route Reorganization are two steps of the ADABCP [ 22 , 83 ]. A significant data stream is evaluated while defining Route Organization, which gets values for numerous mobile node attributes.…”
Section: Routing Protocols Communication For Rushing Attacker Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…From Eqs. (8) and 9, we obtain QQ T = WW T , and then Q and W have the same singular values, i.e., q = w . Additionally, the left singular vectors of both Q and W are equal, i.e., U q = U w .…”
Section: Lemma 1 (Equivalence Of Interleaving Svd Mergence)mentioning
confidence: 99%