Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Wireless ad hoc network of manet, vanet, fanet and sanet: a review
S Yogarayan - Journal of Telecommunication, Electronic and …, 2021 - jtec.utem.edu.my
Wireless Ad Hoc Network of MANET, VANET, FANET and SANET: A Review Page 1 ISSN: 2180 –
1843 e-ISSN: 2289-8131 Vol. 13 No. 4 October – December 2021 13 Wireless Ad Hoc Network of …
1843 e-ISSN: 2289-8131 Vol. 13 No. 4 October – December 2021 13 Wireless Ad Hoc Network of …
Performance improvements of AODV by black hole attack detection using IDS and digital signature
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly,
where there is no central administration. They are prone to different types of attacks such as …
where there is no central administration. They are prone to different types of attacks such as …
An Overview of Game Theory Approaches for Mobile Ad-Hoc Network's Security
The issue of cybersecurity has gained significant prominence in the context of safeguarding
the privacy and integrity of information, especially with the increasing prevalence of …
the privacy and integrity of information, especially with the increasing prevalence of …
An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm
Wireless networks are gaining popularity now a days. A Vehicular Ad-hoc network that is
able to configure all network devices, which means all devices work as host and as a router …
able to configure all network devices, which means all devices work as host and as a router …
[PDF][PDF] Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET.
V Srinivasan - Ingénierie des Systèmes d Inf., 2021 - researchgate.net
Mobile Ad-Hoc Networks (MANETs) due to their reconfigurable nature are being integrated
into new and futuristic knowledge such as Internet of Things (IoT), cloud, reconfigurable …
into new and futuristic knowledge such as Internet of Things (IoT), cloud, reconfigurable …
Performance analysis of hello flood attack in wsn
S Banga, H Arora, S Sankhla, G Sharma… - … on Communication and …, 2020 - Springer
The wireless sensor network has become an important application of the customized
network model, to monitor the physical environment. These sensing element networks …
network model, to monitor the physical environment. These sensing element networks …
Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques-A Review
A Yaqoob, A Shamas, J Ibrahim - International Journal of …, 2024 - koreascience.kr
Abstract Mobile Ad hoc Network is a network of multiple wireless nodes which communicate
and exchange information together without any fixed and centralized infrastructure. The core …
and exchange information together without any fixed and centralized infrastructure. The core …
Dragon-AODV: efficient Ad Hoc on-demand distance vector routing protocol using dragon fly algorithm
Dragonfly is one of the latest swarm intelligence techniques which exhibit the hunting and
the direction-finding actions of the dragonflies. This paper proposed a modified design of Ad …
the direction-finding actions of the dragonflies. This paper proposed a modified design of Ad …
A hybrid cluster technique for improving the efficiency of colour image segmentation
Image segmentation is a wide area for researching, and in many applications, segmentation
is applied for finding the distinct group in the feature space. It separates the data into …
is applied for finding the distinct group in the feature space. It separates the data into …
Attacks and security issues of mobile ad hoc networks
Abstract Mobile Ad Hoc Network has acknowledged a large amount of interest among users
by forming a temporary network. MANET does not have any fixed infrastructure. Due to the …
by forming a temporary network. MANET does not have any fixed infrastructure. Due to the …