Return to Article Details Routing and Security Based Ad-Hoc Networks Configuration for Identification of Attack Using Reinforcement Learning Approach Download Download PDF