Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Design guidelines on trust management for underwater wireless sensor networks
R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …
ActiveTrust: Secure and trustable routing in wireless sensor networks
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical
applications. Because of their inherent resource-constrained characteristics, they are prone …
applications. Because of their inherent resource-constrained characteristics, they are prone …
A survey on trust models in heterogeneous networks
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …
network system, which has become a hot research area in recent years towards next …
Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods
This paper proposes an intelligent hybrid model that leverages machine learning and
artificial intelligence to enhance the security of Wireless Sensor Networks (WSNs) by …
artificial intelligence to enhance the security of Wireless Sensor Networks (WSNs) by …
A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks
P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …
consistently growing, militating an endless arm race between attackers and defenders. In …
An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications
J Duan, D Gao, D Yang, CH Foh… - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Trust evaluation plays an important role in securing wireless sensor networks (WSNs), which
is one of the most popular network technologies for the Internet of Things (IoT). The …
is one of the most popular network technologies for the Internet of Things (IoT). The …