{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:03:18Z","timestamp":1730325798844,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,4]]},"DOI":"10.1145\/3549206.3549299","type":"proceedings-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T19:26:28Z","timestamp":1666639588000},"page":"544-549","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure and Energy Efficient Routing in Wireless Sensor Network using Machine Learning"],"prefix":"10.1145","author":[{"given":"Meena","family":"Pundir","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Chandigarh University, India"}]},{"given":"Jasminder Kaur","family":"Sandhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chandigarh University, India"}]},{"given":"Puneet","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chandigarh University, India"}]},{"given":"Prateek","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Chitkara University Institute of Engineering and Technology, Chitkara University, India"}]}],"member":"320","published-online":{"date-parts":[[2022,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2008.4761982"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.INFFUS.2018.11.010"},{"key":"#cr-split#-e_1_3_2_1_4_1.1","doi-asserted-by":"crossref","unstructured":"Paulo Gil Hugo Martins and F\u00e1bio Janu\u00e1rio. 2018. Outliers detection methods in wireless sensor networks. Artificial Intelligence Review 2018 52:4 52 4: 2411-2436. https:\/\/doi.org\/10.1007\/S10462-018-9618-2 10.1007\/S10462-018-9618-2","DOI":"10.1007\/s10462-018-9618-2"},{"key":"#cr-split#-e_1_3_2_1_4_1.2","doi-asserted-by":"crossref","unstructured":"Paulo Gil Hugo Martins and F\u00e1bio Janu\u00e1rio. 2018. Outliers detection methods in wireless sensor networks. Artificial Intelligence Review 2018 52:4 52 4: 2411-2436. https:\/\/doi.org\/10.1007\/S10462-018-9618-2","DOI":"10.1007\/s10462-018-9618-2"},{"key":"#cr-split#-e_1_3_2_1_5_1.1","doi-asserted-by":"crossref","unstructured":"Mohammad Nafis Ul Islam Ahmed Fahmin Md. Shohrab Hossain and Mohammed Atiquzzaman. 2020. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques. Wireless Personal Communications 2020 116:3 116 3: 1993-2021. https:\/\/doi.org\/10.1007\/S11277-020-07776-3 10.1007\/S11277-020-07776-3","DOI":"10.1007\/s11277-020-07776-3"},{"key":"#cr-split#-e_1_3_2_1_5_1.2","doi-asserted-by":"crossref","unstructured":"Mohammad Nafis Ul Islam Ahmed Fahmin Md. Shohrab Hossain and Mohammed Atiquzzaman. 2020. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques. Wireless Personal Communications 2020 116:3 116 3: 1993-2021. https:\/\/doi.org\/10.1007\/S11277-020-07776-3","DOI":"10.1007\/s11277-020-07776-3"},{"key":"#cr-split#-e_1_3_2_1_6_1.1","doi-asserted-by":"crossref","unstructured":"Vahid Jafarizadeh Amin Keshavarzi and Tajedin Derikvand. 2016. Efficient cluster head selection using Na\u00efve Bayes classifier for wireless sensor networks. Wireless Networks 2016 23:3 23 3: 779-785. https:\/\/doi.org\/10.1007\/S11276-015-1169-8 10.1007\/S11276-015-1169-8","DOI":"10.1007\/s11276-015-1169-8"},{"key":"#cr-split#-e_1_3_2_1_6_1.2","doi-asserted-by":"crossref","unstructured":"Vahid Jafarizadeh Amin Keshavarzi and Tajedin Derikvand. 2016. Efficient cluster head selection using Na\u00efve Bayes classifier for wireless sensor networks. Wireless Networks 2016 23:3 23 3: 779-785. https:\/\/doi.org\/10.1007\/S11276-015-1169-8","DOI":"10.1007\/s11276-015-1169-8"},{"key":"e_1_3_2_1_7_1","first-page":"318","volume-title":"MAC and Network Layer. Electronics","volume":"10","author":"Kulin Merima","year":"2021","unstructured":"Merima Kulin , Tarik Kazaz , Eli De Poorter , and Ingrid Moerman . 2021 . A Survey on Machine Learning-Based Performance Improvement of Wireless Networks: PHY , MAC and Network Layer. Electronics 2021, Vol. 10 , Page 318 10, 3: 318. https:\/\/doi.org\/10.3390\/ELECTRONICS10030318 10.3390\/ELECTRONICS10030318 Merima Kulin, Tarik Kazaz, Eli De Poorter, and Ingrid Moerman. 2021. A Survey on Machine Learning-Based Performance Improvement of Wireless Networks: PHY, MAC and Network Layer. Electronics 2021, Vol. 10, Page 318 10, 3: 318. https:\/\/doi.org\/10.3390\/ELECTRONICS10030318"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100314"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMCOM.2016.07.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.09.013"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCIS48478.2019.8974465"},{"key":"#cr-split#-e_1_3_2_1_13_1.1","doi-asserted-by":"crossref","unstructured":"Hossein Saeedi Emadi and Sayyed Majid Mazinani. 2017. A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks. Wireless Personal Communications 2017 98:2 98 2: 2025-2035. https:\/\/doi.org\/10.1007\/S11277-017-4961-1 10.1007\/S11277-017-4961-1","DOI":"10.1007\/s11277-017-4961-1"},{"key":"#cr-split#-e_1_3_2_1_13_1.2","doi-asserted-by":"crossref","unstructured":"Hossein Saeedi Emadi and Sayyed Majid Mazinani. 2017. A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks. Wireless Personal Communications 2017 98:2 98 2: 2025-2035. https:\/\/doi.org\/10.1007\/S11277-017-4961-1","DOI":"10.1007\/s11277-017-4961-1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/203814"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Linus Wallgren Shahid Raza and Thiemo Voigt. 2013. Routing Attacks and Countermeasures in the RPL-Based Internet of Things: http:\/\/dx.doi.org\/10.1155\/2013\/794326 2013: 11. https:\/\/doi.org\/10.1155\/2013\/794326 10.1155\/2013\nLinus Wallgren Shahid Raza and Thiemo Voigt. 2013. Routing Attacks and Countermeasures in the RPL-Based Internet of Things: http:\/\/dx.doi.org\/10.1155\/2013\/794326 2013: 11. https:\/\/doi.org\/10.1155\/2013\/794326","DOI":"10.1155\/2013\/794326"},{"key":"#cr-split#-e_1_3_2_1_16_1.1","doi-asserted-by":"crossref","unstructured":"Mohammad Wazid and Ashok Kumar Das. 2016. An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wireless Personal Communications 2016 90:4 90 4: 1971-2000. https:\/\/doi.org\/10.1007\/S11277-016-3433-3 10.1007\/S11277-016-3433-3","DOI":"10.1007\/s11277-016-3433-3"},{"key":"#cr-split#-e_1_3_2_1_16_1.2","doi-asserted-by":"crossref","unstructured":"Mohammad Wazid and Ashok Kumar Das. 2016. An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wireless Personal Communications 2016 90:4 90 4: 1971-2000. https:\/\/doi.org\/10.1007\/S11277-016-3433-3","DOI":"10.1007\/s11277-016-3433-3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.58"}],"event":{"name":"IC3-2022: 2022 Fourteenth International Conference on Contemporary Computing","acronym":"IC3-2022","location":"Noida India"},"container-title":["Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549206.3549299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T23:33:29Z","timestamp":1673739209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,4]]},"references-count":22,"alternative-id":["10.1145\/3549206.3549299","10.1145\/3549206"],"URL":"https:\/\/doi.org\/10.1145\/3549206.3549299","relation":{},"subject":[],"published":{"date-parts":[[2022,8,4]]},"assertion":[{"value":"2022-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}