Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Internet of Things intrusion detection systems: a comprehensive review and future directions
A Heidari, MA Jabraeil Jamali - Cluster Computing, 2023 - Springer
Abstract The Internet of Things (IoT) is a paradigm that connects objects to the Internet as a
whole and enables them to work together to achieve common objectives, such as innovative …
whole and enables them to work together to achieve common objectives, such as innovative …
A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications
A Seyfollahi, A Ghaffari - Wireless Communications and Mobile …, 2021 - Wiley Online Library
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
Passive rule-based approach to detect sinkhole attack in RPL-based internet of things networks
S Al-Sarawi, M Anbar, BA Alabsi, MA Aladaileh… - IEEE …, 2023 - ieeexplore.ieee.org
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …
Customised intrusion detection for an industrial IoT heterogeneous network based on machine learning algorithms called FTL-CID
N Abosata, S Al-Rubaye, G Inalhan - Sensors, 2022 - mdpi.com
Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for
humans by connecting everything through the Internet. The de facto standardised IoT routing …
humans by connecting everything through the Internet. The de facto standardised IoT routing …
Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach
F Azzedin - IEEE Access, 2023 - ieeexplore.ieee.org
In domains such as telehealth, intelligent transportation, and autonomous agriculture,
ensuring secure routing of collected and exchanged data is paramount. Since its inception …
ensuring secure routing of collected and exchanged data is paramount. Since its inception …
Threat analysis model to control IoT network routing attacks through deep learning approach
K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …
The open interface and network connectivity of the interconnected systems under the IoT …
A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things
Summary Internet of Things (IoT) is an internet of smart objects where smart objects
communicate with each other. IoT objects are deployed in open medium with dynamic …
communicate with each other. IoT objects are deployed in open medium with dynamic …
A softwarized intrusion detection system for the RPL-based Internet of Things networks
G Violettas, G Simoglou, S Petridou… - Future Generation …, 2021 - Elsevier
Abstract Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0)
vision, technologically transforming production and societies. It enables novel services …
vision, technologically transforming production and societies. It enables novel services …
Mitigating the worst parent attack in RPL based internet of things
Abstract The Low Power and Lossy Networks (LLNs) in the Internet of Things environment
comprising constrained embedded devices have particular routing requirements that are …
comprising constrained embedded devices have particular routing requirements that are …
Centralized and distributed intrusion detection for resource-constrained wireless SDN networks
Software-defined networking (SDN) was devised to simplify network management and
automate infrastructure sharing in wired networks. These benefits motivated the application …
automate infrastructure sharing in wired networks. These benefits motivated the application …