Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Black hole attack detection and prevention mechanism for mobile ad-hoc networks
S Dhama, S Sharma, M Saini - 2016 3rd International …, 2016 - ieeexplore.ieee.org
In the mobile Ad-hoc networks, there exists various challenges in packet data delivery
mechanism. Therefore transferring data from one node to other node is challenging. One of …
mechanism. Therefore transferring data from one node to other node is challenging. One of …
[PDF][PDF] Recognizing illegitimate access points based on static features: a case study in a campus wifi network
F Tchakounté, M Nakoe, BO Yenke… - International Journal of …, 2019 - researchgate.net
Wireless networks are useful to disseminate information across an institution. However,
access points are often abandoned with vulnerable security protocols and the network is …
access points are often abandoned with vulnerable security protocols and the network is …
[PDF][PDF] Simulation of Wormhole Attack in Wireless Sensor Networks using AOMDV Protocol
Wormhole attack, a resource depletion attack being considered as one of the severe attack
in Wireless Sensor Networks (WSN). It can interfere routing process at any time, drain the …
in Wireless Sensor Networks (WSN). It can interfere routing process at any time, drain the …
Reliable Data Delivery Mechanism for Mobile Ad Hoc Network Using Cross-Layer Approach
S Sharma, R Mishra, S Dhama - Next-Generation Networks: Proceedings …, 2018 - Springer
In the mobile ad hoc networks, there exist various challenges in packet data delivery
mechanism. Few of the challenges due to which packet delivery fails are route failure and …
mechanism. Few of the challenges due to which packet delivery fails are route failure and …