Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security threats and detection techniques in cognitive radio networks
With the rapid proliferation of new technologies and services in the wireless domain,
spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and …
spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and …
Denial of service defence for resource availability in wireless sensor networks
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …
networking solutions with exciting new applications for the near future. Its deployment has …
[LIVRE][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
On event-triggered control of linear systems under periodic denial-of-service jamming attacks
HS Foroush, S Martinez - 2012 IEEE 51st IEEE conference on …, 2012 - ieeexplore.ieee.org
In this paper we study the resilience of a continuous LTI system which is controlled remotely
via a wireless channel. An energy-constrained periodic (partially known) jammer is …
via a wireless channel. An energy-constrained periodic (partially known) jammer is …
Attack-tolerant switched fault detection filter for networked stochastic systems under resilient event-triggered scheme
X Chen, S Hu, D Yue, X **e… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article investigates the problem of event-triggered switched fault-detection filters for
networked stochastic systems under Denial-of-Service (DoS) jamming attacks. The …
networked stochastic systems under Denial-of-Service (DoS) jamming attacks. The …
Digital filter design for jamming mitigation in 802.15. 4 communication
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or
periodically cycling the jamming transmission on and off, attacks respectively known as …
periodically cycling the jamming transmission on and off, attacks respectively known as …
A lightweight framework for secure life-logging in smart environments
As the world becomes an interconnected network where objects and humans interact with
each other, new challenges and threats appear in the ecosystem. In this interconnected …
each other, new challenges and threats appear in the ecosystem. In this interconnected …
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype
The proliferation of wireless networks has been remarkable during the last decade. The
license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled …
license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled …
On multi-input controllable linear systems under unknown periodic dos jamming attacks
HS Foroush, S Martinez - 2013 Proceedings of the Conference on Control and …, 2013 - SIAM
In this paper, we study remotely controlled and observed multi-input controllable continuous
linear systems, subject to periodic Denial-of-Service (DoS) jamming attacks. We first design …
linear systems, subject to periodic Denial-of-Service (DoS) jamming attacks. We first design …
Physical-layer intrusion detection for wireless networks using compressed sensing
The broadcast nature of wireless networks has been widely exploited by adversaries in
order to cause severe denial-of-service attacks. Several algorithms are proposed in the …
order to cause severe denial-of-service attacks. Several algorithms are proposed in the …