Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control
The existing power grid is going through a massive transformation. Smart grid technology is
a radical approach for improvisation in prevailing power grid. Integration of electrical and …
a radical approach for improvisation in prevailing power grid. Integration of electrical and …
Cyber-physical power and energy systems with wireless sensor networks: A systematic review
Power grids are among the primary targets for exploitation by cyber-attacks. Modern power
and energy systems are controlled and monitored by a network of electrical and …
and energy systems are controlled and monitored by a network of electrical and …
Connectivity of soft random geometric graphs
MD Penrose - 2016 - projecteuclid.org
Consider a graph on n uniform random points in the unit square, each pair being connected
by an edge with probability p if the inter-point distance is at most r. We show that as n→∞ …
by an edge with probability p if the inter-point distance is at most r. We show that as n→∞ …
A study of design requirements for mobile learning environments
This paper proposes a conceptual framework for mobile learning applications that provides
systematic support for mobile learning experience design. It is based on a combination of a …
systematic support for mobile learning experience design. It is based on a combination of a …
On connectivity and robustness in random intersection graphs
Random intersection graphs have received much attention recently and been used in a wide
range of applications ranging from key predistribution in wireless sensor networks to …
range of applications ranging from key predistribution in wireless sensor networks to …
Online convex optimization over Erdos-Rényi random networks
The work studies how node-to-node communications over an Erd\H {o} sR\'enyi random
network influence distributed online convex optimization, which is vital in solving large-scale …
network influence distributed online convex optimization, which is vital in solving large-scale …
Zero-one laws for connectivity in inhomogeneous random key graphs
We introduce a new random key predistribution scheme for securing heterogeneous
wireless sensor networks. Each of the n sensors in the network is classified into r classes …
wireless sensor networks. Each of the n sensors in the network is classified into r classes …
Topological Properties of Secure Wireless Sensor Networks Under the -Composite Key Predistribution Scheme With Unreliable Links
Security is an important issue in wireless sensor networks (WSNs), which are often deployed
in hostile environments. The q-composite key predistribution scheme has been recognized …
in hostile environments. The q-composite key predistribution scheme has been recognized …
-Connectivity in Random Key Graphs With Unreliable Links
Random key graphs form a class of random intersection graphs that are naturally induced by
the random key predistribution scheme of Eschenauer and Gligor for securing wireless …
the random key predistribution scheme of Eschenauer and Gligor for securing wireless …
On the connectivity of sensor networks under random pairwise key predistribution
We investigate the connectivity of wireless sensor networks under the random pairwise key
predistribution scheme of Chan Under the assumption of full visibility, this reduces to …
predistribution scheme of Chan Under the assumption of full visibility, this reduces to …