Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Internet of Things (IoT) cybersecurity research: A review of current research topics
Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …
comprising of people, smart devices, intelligent objects, data, and information. The …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A New Level Intrusion Detection System for Node Level Drop Attacks in Wireless Sensor Network
K Madhuri - Journal of Algebraic Statistics, 2022 - publishoa.com
Recently, wireless sensor networks (WSNs) have received much attention by researchers
because of their lower cost of deployment and easier to use. These networks are more …
because of their lower cost of deployment and easier to use. These networks are more …
Secure signature-based authenticated key establishment scheme for future IoT applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …
These devices can be remotely accessed and controlled using existing network …
A survey on successors of LEACH protocol
Even after 16 years of existence, low energy adaptive clustering hierarchy (LEACH) protocol
is still gaining the attention of the research community working in the area of wireless sensor …
is still gaining the attention of the research community working in the area of wireless sensor …
Security of the Internet of Things: perspectives and challenges
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …
up, it covers from traditional equipment to general household objects such as WSNs and …
What are the trend and core knowledge of information security? A citation and co-citation analysis
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …
potential safety hazards to organizations. In response to the increasing academia and …
PhaseBeat: Exploiting CSI phase data for vital sign monitoring with commodity WiFi devices
Vital signs, such as respiration and heartbeat, are useful to health monitoring since such
signals provide important clues of medical conditions. Effective solutions are needed to …
signals provide important clues of medical conditions. Effective solutions are needed to …
IoT technologies<? show [AQ ID= Q1]?> for smart cities
The large deployment of Internet of things (IoT) is actually enabling smart city projects and
initiatives all over the world. Objects used in daily life are being equipped with electronic …
initiatives all over the world. Objects used in daily life are being equipped with electronic …
Cyber security in new space: Analysis of threats, key enabling technologies and challenges
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …
environment, achieving greater accessibility for an increasing number of parties. New and …