Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Threat analysis for space information network based on network security attributes: a review
X Wu, Y Du, T Fan, J Guo, J Ren, R Wu… - Complex & Intelligent …, 2023 - Springer
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to
the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much …
the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much …
A survey on peer-to-peer key management for mobile ad hoc networks
JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …
hoc networks (MANETs). The protocols are subdivided into groups based on their design …
A delay-tolerant network architecture for challenged internets
K Fall - Proceedings of the 2003 conference on Applications …, 2003 - dl.acm.org
The highly successful architecture and protocols of today's Internet may operate poorly in
environments characterized by very long delay paths and frequent network partitions. These …
environments characterized by very long delay paths and frequent network partitions. These …
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
The Internet has become essential to all aspects of modern life, and thus the consequences
of network disruption have become increasingly severe. It is widely recognised that the …
of network disruption have become increasingly severe. It is widely recognised that the …
Pocket switched networks and human mobility in conference environments
Pocket Switched Networks (PSN) make use of both human mobility and local/global
connectivity in order to transfer data between mobile users' devices. This falls under the …
connectivity in order to transfer data between mobile users' devices. This falls under the …
Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation
As the Internet becomes increasingly important to all aspects of society, the consequences
of disruption become increasingly severe. Thus it is critical to increase the resilience and …
of disruption become increasingly severe. Thus it is critical to increase the resilience and …
Network coding for efficient communication in extreme networks
Some forms of ad-hoc networks need to operate in extremely performance-challenged
environments where end-to-end connectivity is rare. Such environments can be found for …
environments where end-to-end connectivity is rare. Such environments can be found for …
A survey of survivability in mobile ad hoc networks
Many efforts have been done towards secure MANETs, but the conventional lines of defense
are still inefficient to put all attacks off. This article examines survivable approaches whose …
are still inefficient to put all attacks off. This article examines survivable approaches whose …
Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: A simulation-based approach
Communication networks play a vital role in our daily lives and they have become a critical
infrastructure. However, networks in general, and the Internet in particular face a number of …
infrastructure. However, networks in general, and the Internet in particular face a number of …
Efficient clustering algorithms for self-organizing wireless sensor networks
Self-organization of wireless sensor networks, which involves network decomposition into
connected clusters, is a challenging task because of the limited bandwidth and energy …
connected clusters, is a challenging task because of the limited bandwidth and energy …