Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey on the implementation and management of secure virtual private networks (vpns) and virtual lans (vlans) in static and mobile scenarios
Nowadays, the demand for connection between the remote offices of a company, or
between research locations, and constantly increasing work mobility (partly due to the …
between research locations, and constantly increasing work mobility (partly due to the …
Routing in mobile opportunistic social networks with selfish nodes
When the connection to Internet is not available during networking activities, an
opportunistic approach exploits the encounters between mobile human‐carried devices for …
opportunistic approach exploits the encounters between mobile human‐carried devices for …
Energy efficient QoS aware hierarchical KF-MAC routing protocol in MANET
The paper proposes an energy efficient quality of services (QoS) aware hierarchical KF-
MAC routing protocol in mobile ad-hoc networks. The proposed KF-MAC (K-means cluster …
MAC routing protocol in mobile ad-hoc networks. The proposed KF-MAC (K-means cluster …
Light weight cryptography for cloud-based e-health records
Cloud computing is currently a popular research topic among academics. It is an internet-
based resource pool with a wide range of resources. The cloud environment is extremely …
based resource pool with a wide range of resources. The cloud environment is extremely …
Optimizing power consumption of mobile devices for video streaming over 4G LTE networks
While the video streaming technique and 4G LTE networks are develo** rapidly, the
advancement of the battery technology, however, is relatively slow. Existing works have paid …
advancement of the battery technology, however, is relatively slow. Existing works have paid …
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …
Power consumption analysis of video streaming in 4G LTE networks
Video streaming, one of the most popular technologies for online video playback, has
already been applied to 4G LTE networks. Previous work has been devoted to …
already been applied to 4G LTE networks. Previous work has been devoted to …
A distributed mitigation strategy against DoS attacks in edge computing
Internet of Things (IoT) is a platform where every day devices become smarter, every day
processing becomes intelligent, and every day communication becomes informative …
processing becomes intelligent, and every day communication becomes informative …
Enhanced secure and efficient key management algorithm and fuzzy with trust management for MANETs
NA Malik, M Rai - Proceedings of the International Conference on …, 2020 - papers.ssrn.com
Abstract Mobile Ad-hoc Network (MANET), a network of self-configuring that ignores
consuming static network infrastructure besides the centralized Base Station (BS). The …
consuming static network infrastructure besides the centralized Base Station (BS). The …
Hybrid MANET–DTN and a new algorithm for relay nodes selection
In this paper, a new way to a selection of the secure relay nodes in hybrid MANET–DTN
networks based on the cooperation between routing, trust and game theory mechanisms is …
networks based on the cooperation between routing, trust and game theory mechanisms is …