Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks
R Wan, L Ding, N **ong, X Zhou - International Journal of …, 2019 - journals.sagepub.com
To detect the primary user's activity accurately in cognitive radio sensor networks,
cooperative spectrum sensing is recommended to improve the sensing performance and the …
cooperative spectrum sensing is recommended to improve the sensing performance and the …
Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things
L Miao, X Di, ZM Huo, ZX Sun - Telecommunication Systems, 2022 - Springer
Abstract The Internet of Things (IoT) is a new paradigm for connecting various
heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) …
heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) …
An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks
D Yao, S Yuan, Z Lv, D Wan, W Mao - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the potential applicability of spectrum sensing, cognitive wireless sensor networks
have attracted plenty of interest in the research community to improve the bandwidth …
have attracted plenty of interest in the research community to improve the bandwidth …
Lightweight cloned‐node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs
Cognitive Wireless Sensor Networks (CWSNs) provide better bandwidth utilization when
compared with normal wireless sensor networks. CWSNs use a technique called …
compared with normal wireless sensor networks. CWSNs use a technique called …
The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks
Cognitive radio technology addresses the spectrum scarcity challenges by allowing
unlicensed cognitive devices to opportunistically utilize spectrum band allocated to licensed …
unlicensed cognitive devices to opportunistically utilize spectrum band allocated to licensed …
Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network
PS Chatterjee - 2021 International Conference on Intelligent …, 2021 - ieeexplore.ieee.org
Cognitive Wireless Sensor Network (CWSN) uses the spectrum wisely in comparison to a
traditional Wireless Sensor Network (WSN). The technique which enables Cognitive …
traditional Wireless Sensor Network (WSN). The technique which enables Cognitive …
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The
anomalies are considered as samples that do not follow a normal pattern and significantly …
anomalies are considered as samples that do not follow a normal pattern and significantly …
Using a UNPCC based classification algorithm for detection of PUE attackers in cognitive wireless sensor networks
Primary User Emulation (PUE) attack is a type of Denial of Service (DoS) attack in Cognitive
Wireless Sensor Network (CWSNs), where malicious secondary users (SU) try to emulate …
Wireless Sensor Network (CWSNs), where malicious secondary users (SU) try to emulate …
Detecting PUE attack by measuring aberrational node behavior in CWSN
Primary User Emulation (PUE) attack is a type of Denial of Service (DoS) attack in Cognitive
Wireless Sensor Network (CWSN), where malicious secondary users (SU) try to emulate …
Wireless Sensor Network (CWSN), where malicious secondary users (SU) try to emulate …
Application of Random Forest Classifier for Prevention and Detection of Distributed Denial of Service Attacks
S Das, Z Dayam, PS Chatterjee - 2022 OITS International …, 2022 - ieeexplore.ieee.org
A classification issue in machine learning is the issue of spotting Distributed Denial of
Service (DDos) attacks. A Denial of Service (DoS) assault is essentially a deliberate attack …
Service (DDos) attacks. A Denial of Service (DoS) assault is essentially a deliberate attack …