Packet routing in dynamically changing networks: A reinforcement learning approach. In Proceedings of the 6th International Conference on Neural Information Processing Systems, Denver, CO, USA, 29 November–2 December 1993; pp. 671–678. [Google Scholar] Thrun, S.; Burgard, W.; Fox, D. ...
R A fundamental element in Diameter is the realm, which is loosely referred to as domain. Realm IDs are owned by service providers and are used by Diameter nodes for message routing. X eXtensible Markup Language A version of the Standard Generalized Markup Language (SGML) that allows Web ...
Chamikara MAP, Bertok P, Liu D, Camtepe S, Khalil I (2019) An EfÞcient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams, Comput Secur, https://doi.org/10.1016/j.cose.2019.101570 Chandramohan D, Vengattaraman T, Dhavachelvan P, Baskaran R, Venkatachalapathy VSK...
Many real-world problems, such as network packet routing and the coordination of autonomous vehicles, are naturally modelled as cooperative multi-agent systems. There is a great need for new reinforcement learning methods that can efficiently learn decentralised policies for such systems. To this end...
Reinforcement Learning Based on Routing with Infrastructure Nodes for Data Dissemination in Vehicular Networks (RRIN). Wirel. Netw. 2022, 28, 2169–2184. [Google Scholar] [CrossRef] Lou, C.; Hou, F. Efficient DRL-based HD map Dissemination in V2I Communications. In Proceedings of the ICC ...
Packet routing in dynamically changing networks: A reinforcement learning approach. In Proceedings of the 6th International Conference on Neural Information Processing Systems, Denver, CO, USA, 29 November–2 December 1993; pp. 671–678. [Google Scholar] Thrun, S.; Burgard, W.; Fox, D. ...
Packet routing in dynamically changing networks: A reinforcement learning approach. In Proceedings of the 6th International Conference on Neural Information Processing Systems, Denver, CO, USA, 29 November–2 December 1993; pp. 671–678. [Google Scholar] Thrun, S.; Burgard, W.; Fox, D. ...
The DoS attack can be implemented by the attackers in several ways: filling buffers in a user or the kernal domain, blocking or jamming the communication among key components, and altering a routing protocol. Refs. [26,27,30,35], respectively, analyze the DoS attack in the form of ...
The DoS attack can be implemented by the attackers in several ways: filling buffers in a user or the kernal domain, blocking or jamming the communication among key components, and altering a routing protocol. Refs. [26,27,30,35], respectively, analyze the DoS attack in the form of ...
We compared the proposed MADDPG-based framework to DDPG for network metrics: delay, jitter, packet loss rate, bandwidth usage, and intrusion detection. The results show a significant improvement in network metrics with the two agents. Keywords: MADDPG; SDN; IoT; routing; reinforcement learning; ...