Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Current research on Internet of Things (IoT) security: A survey
WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …
Data collection for attack detection and security measurement in mobile ad hoc networks: A survey
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET
The latest advancements in wireless communication promotes the researchers to
concentrate more in the expansion of Mobile Ad hoc Networks (MANETs), where nodes …
concentrate more in the expansion of Mobile Ad hoc Networks (MANETs), where nodes …
Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks
Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that can
maliciously drop a subset of forwarding packets to degrade network performance and …
maliciously drop a subset of forwarding packets to degrade network performance and …
Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …
Controversy-adjudication-based trust management mechanism in the internet of underwater things
Owing to the characteristics of underwater communication, such as limited bandwidth, low
transmission speed, and long delivery delay, it is significantly challenging to address trust …
transmission speed, and long delivery delay, it is significantly challenging to address trust …
[HTML][HTML] Counteracting selfish nodes using reputation based system in mobile ad hoc networks
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile
nodes without predefined and pre-established architecture where mobile nodes can …
nodes without predefined and pre-established architecture where mobile nodes can …
Toward energy-efficient and trustworthy eHealth monitoring system
The rapid technological convergence between Internet of Things (IoT), Wireless Body Area
Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising …
Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising …
Trust management for secure cognitive radio vehicular ad hoc networks
Recently, there are growing interests in cognitive radio vehicular ad hoc networks (CR-
VANETs), which is a kind of intelligent cyber-physical systems. In CR-VANETs, there are two …
VANETs), which is a kind of intelligent cyber-physical systems. In CR-VANETs, there are two …