Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy issues of UAV: A survey
The rapid development of the Unmanned Aerial Vehicle (UAV) brings much convenience to
our life. However, security and privacy problems caused by UAVs are gradually exposed …
our life. However, security and privacy problems caused by UAVs are gradually exposed …
Aeronautical Networking for the Internet-Above-the-Clouds
The engineering vision of relying on the “smart sky” for supporting air traffic and the “internet-
above-the-clouds” for in-flight entertainment has become imperative for the future aircraft …
above-the-clouds” for in-flight entertainment has become imperative for the future aircraft …
Blockchain-Aided secure access control for UAV computing networks
Multiple unmanned aerial vehicles (UAVs) form a UAV cluster, which relies on wireless
communication networks to facilitate information interaction among the UAVs. UAV clusters …
communication networks to facilitate information interaction among the UAVs. UAV clusters …
Attacks and defenses in short-range wireless technologies for IoT
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
[HTML][HTML] Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation
MA Al-Shareeda, S Manickam - Symmetry, 2022 - mdpi.com
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields,
including the environment, energy efficiency, smart transportation, intelligent agriculture, and …
including the environment, energy efficiency, smart transportation, intelligent agriculture, and …
Cyber-physical attack threats analysis for UAVs from CPS perspective
G Rong-**ao, T Ji-wei, W Bu-hong… - … conference on computer …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) have been widely adopted in military and civilian areas.
However, security problems of UAVs are also gradually exposed and attracted great …
However, security problems of UAVs are also gradually exposed and attracted great …
Security issues in flying ad-hoc networks (FANETS)
Abstract Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the
use of multi-UAV systems in military and civil applications. The most important benefit of the …
use of multi-UAV systems in military and civil applications. The most important benefit of the …
An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET
A Dorri - Wireless Networks, 2017 - Springer
Abstract Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network
with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop …
with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop …
Confirmation of wormhole attack in MANETs using honeypot
DSK Tiruvakadu, V Pallapa - Computers & Security, 2018 - Elsevier
The flexibility and ease of deployment provided by Mobile Ad hoc Networks (MANETs) come
at the cost of lack of security and vulnerability. Many solutions are proposed to protect …
at the cost of lack of security and vulnerability. Many solutions are proposed to protect …
Identity attack detection system for 802.11-based ad hoc networks
Due to the lack of centralized identity management and the broadcast nature of wireless ad
hoc networks, identity attacks are always tempting. The attackers can create multiple …
hoc networks, identity attacks are always tempting. The attackers can create multiple …