Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks
Integrating blockchain into the Internet of Things (IoT) for security is a new development in
computational communication systems. While security threats are changing their strategies …
computational communication systems. While security threats are changing their strategies …
[HTML][HTML] M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks
Abstract The Internet of Things (IoT) has recently received a lot of attention from the
information and communication technology community. It has turned out to be a crucial …
information and communication technology community. It has turned out to be a crucial …
[HTML][HTML] Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …
healthcare, smart grids, and intelligent transportation systems necessitates robust security …
Secureiiot environment: Federated learning empowered approach for securing iiot from data breach
The growing congruence of gadgets today resulted in a numerous type of cyber attacks. A
similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data …
similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data …
Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment
The essential role of intrusion detection is to manage the critical infrastructure to detect
malicious activity competently concerning the Internet of Things (IoT). The IoT network is …
malicious activity competently concerning the Internet of Things (IoT). The IoT network is …
Machine learning and deep learning approaches in IoT
The internet is a booming sector for exchanging information because of all the gadgets in
today's world. Attacks on Internet of Things (IoT) devices are alarming as these devices …
today's world. Attacks on Internet of Things (IoT) devices are alarming as these devices …
Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks
Smart Cities contains millions of IoT sensors supporting critical applications such as Smart
Transport, Buildings, Intelligent Vehicles, and Logistics. A central administrator appointed by …
Transport, Buildings, Intelligent Vehicles, and Logistics. A central administrator appointed by …
SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber–physical systems
In the era of autonomous systems, the security is indispensable module for flexible
computing environment. Due to increased computer power and network speed, a new …
computing environment. Due to increased computer power and network speed, a new …
Deep learning-based sensing technologies, artificial intelligence-based decision-making algorithms, and big geospatial data analytics in cognitive internet of things
R Blake, KF Michalikova - Analysis and Metaphysics, 2021 - ceeol.com
With growing evidence of deep learning-based sensing technologies, artificial intelligence-
based decision-making algorithms, and big geospatial data analytics, there is an essential …
based decision-making algorithms, and big geospatial data analytics, there is an essential …
Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems
A cyber–physical system (CPS) classically comprises the physical components,
computational units, the controller, and the communication network. The Wireless sensor …
computational units, the controller, and the communication network. The Wireless sensor …