Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review for network intrusion detection system (IDS)
OH Abdulganiyu, T Ait Tchakoucht… - International journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …
individual and corporate data passing through internet has increasingly grown. With gaps in …
A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …
proliferation in many areas such as wearable devices, smart sensors and home appliances …
Towards an efficient model for network intrusion detection system (IDS): systematic literature review
With the recent rise in internet usage, the volume of crucial, private, and confidential data
traveling online has increased. Attackers have made attempts to break into the network due …
traveling online has increased. Attackers have made attempts to break into the network due …
Machine learning for advanced wireless sensor networks: A review
Wireless sensor networks (WSNs) are typically used with dynamic conditions of task-related
environments for sensing (monitoring) and gathering of raw sensor data for subsequent …
environments for sensing (monitoring) and gathering of raw sensor data for subsequent …
An intrusion detection system for wireless sensor networks using deep neural network
V Gowdhaman, R Dhanapal - Soft Computing, 2022 - Springer
Wireless sensor network comprises of a large number of sensor nodes to acquire and
transmit data to the central location. However, due to resource constrained nodes …
transmit data to the central location. However, due to resource constrained nodes …
Voltage over-scaling-based lightweight authentication for IoT security
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT
applications. A hardware-oriented lightweight authentication protocol based on device …
applications. A hardware-oriented lightweight authentication protocol based on device …
Intrusion detection and prevention in fog based IoT environments: A systematic literature review
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …
resources. An important ally of the IoT is fog computing. It extends cloud computing and …
CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities,
mitigation approaches on the power electronics and the security challenges for the smart …
mitigation approaches on the power electronics and the security challenges for the smart …
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review
Wireless technologies usually have very limited computing, memory, and battery power that
require the optimal management of network resources to increase network performance …
require the optimal management of network resources to increase network performance …
A survey on machine learning software-defined wireless sensor networks (ml-SDWSNS): Current status and major challenges
Wireless Sensor Network (WSN), which are enablers of the Internet of Things (IoT)
technology, are typically used en-masse in widely physically distributed applications to …
technology, are typically used en-masse in widely physically distributed applications to …