Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …
working and vulnerability of underlined standard routing protocols is exposed to various …
Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …
infrastructure, high speed in setting up the network, and no need for centralized …
Contradiction based gray-hole attack minimization for ad-hoc networks
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.),
detection & mitigation techniques only function after the attack has commenced. Prevention …
detection & mitigation techniques only function after the attack has commenced. Prevention …
Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET
The recent development in wireless communication technology and portable devices has
led to the development of Mobile Ad-Hoc Network which has unique features such as …
led to the development of Mobile Ad-Hoc Network which has unique features such as …
Wormhole attack detection techniques in ad-hoc network: A systematic review
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …
communicate without pre-existing infrastructure. Owning to utilization of open medium …
An authentication protocol for future sensor networks
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
Survey of secure routing protocols for wireless ad hoc networks
The diverse network technologies and low-end wireless technologies have enabled the
deployment of self-organized wireless ad hoc networks. Nodes forming such networks have …
deployment of self-organized wireless ad hoc networks. Nodes forming such networks have …
A dynamic threshold based approach for mitigating black-hole attack in MANET
Mobile ad-hoc network is an infrastructure less type of network which does not require any
kind of fixed infrastructure. It provides multi-hop communication between the source and …
kind of fixed infrastructure. It provides multi-hop communication between the source and …
A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET
Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic
network topology, open medium, multi-hop communication etc. in which each device not …
network topology, open medium, multi-hop communication etc. in which each device not …