Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances on security threats and countermeasures for cognitive radio networks: A survey
RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …
with the capability to adapt their operating parameters on the fly based on the radio …
Fast-handoff support in IEEE 802.11 wireless networks
With the advance of wireless local area network (WLAN) technology, handoff support has
become one of the most important issues in IEEE 802.11 WLANs. However, the current IEEE …
become one of the most important issues in IEEE 802.11 WLANs. However, the current IEEE …
[PDF][PDF] Security vulnerabilities in wireless sensor networks: A survey
T Kavitha, D Sridharan - Journal of information Assurance and …, 2010 - academia.edu
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …
efficient software algorithms make technically and economically feasible a network …
Design and implementation of secure networked predictive control systems under deception attacks
This brief addresses the security issues of data transmitted in networked control systems
(NCSs), especially confidentiality, integrity and authenticity. A secure networked predictive …
(NCSs), especially confidentiality, integrity and authenticity. A secure networked predictive …
Illusion attack on vanet applications-a message plausibility problem
NW Lo, HC Tsai - 2007 IEEE globecom workshops, 2007 - ieeexplore.ieee.org
In order to reduce car accidents, provide emergency information, novel applications on
vehicular ad hoc networks (VANETs) have drawn a lot of attention in resent years. This …
vehicular ad hoc networks (VANETs) have drawn a lot of attention in resent years. This …
[HTML][HTML] Smart street lighting control and monitoring system for electrical power saving by using VANET
SAE Mohamed - Int'l J. of Communications, Network and System …, 2013 - scirp.org
The huge amount of electrical power of many countries is consumed in lighting the streets.
However, vehicles pass with very low rate in specific periods of time and parts of the streets …
However, vehicles pass with very low rate in specific periods of time and parts of the streets …
Water desalination by solar powered electrodialysis process
HMN AlMadani - Renewable Energy, 2003 - Elsevier
Solar energy is a clean source of energy that is available in all regions of the world. Bahrain,
where the present research was conducted, is rich in solar energy expressed as hours of …
where the present research was conducted, is rich in solar energy expressed as hours of …
Anti-jamming message-driven frequency hop**—Part I: System design
This is Part I of a two-part paper that considers anti-jamming system design in wireless
networks based on message-driven frequency hop** (MDFH), a highly efficient spread …
networks based on message-driven frequency hop** (MDFH), a highly efficient spread …
Modeling and analysis of RRC-based signalling storms in 3G networks
Mobile networks are vulnerable to signaling attacks and storms that are caused by traffic
patterns that overload the control plane, and differ from distributed denial of service attacks …
patterns that overload the control plane, and differ from distributed denial of service attacks …
Joint topology control and authentication design in mobile ad hoc networks with cooperative communications
Security is the main concern and bottleneck for widely deployed wireless applications due to
the fact that wireless channels are vulnerable to attacks and that wireless bandwidth is a …
the fact that wireless channels are vulnerable to attacks and that wireless bandwidth is a …