Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
RPL-based attack detection approaches in IoT networks: review and taxonomy
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …
Detecting version number attacks in low power and lossy networks for internet of things routing: review and taxonomy
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …
implications. It connects a wireless sensor or node network via low-power and lossy …
RPL-based IoT networks under simple and complex routing security attacks: An experimental study
Effective security support still remains a challenge even for a standardized Internet of Things
network protocol such as the IPv6 Routing Protocol for Low-Power and Lossy Networks …
network protocol such as the IPv6 Routing Protocol for Low-Power and Lossy Networks …
Detecting the RPL version number attack in IoT Networks using Deep Learning Models
This research presents a novel approach for detecting the highly perilous RPL version
number attack in IoT networks using deep learning models, specifically Long Short-Term …
number attack in IoT networks using deep learning models, specifically Long Short-Term …
iTRPL: an intelligent and trusted RPL protocol based on multi-agent reinforcement learning
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing
standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc …
standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc …
Hybrid Intrusion Detection System for RPL IoT Networks Using Machine Learning and Deep Learning
The Internet of Things (IoT) is transforming everyday objects. However, its devices' limited
memory, processing power, and network capabilities make them susceptible to security …
memory, processing power, and network capabilities make them susceptible to security …
Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT
This research develops a new method to detect anomalies in time series data using
Convolutional Neural Net-works (CNNs) in healthcare-IoT. The proposed method creates a …
Convolutional Neural Net-works (CNNs) in healthcare-IoT. The proposed method creates a …
Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …
Impact analysis of hello flood attack on RPL
P Maurya, V Kushwaha - International Conference on Advanced Network …, 2022 - Springer
Abstract The Internet of Things (IoT) has a wide range of applications that improve our
quality of life with smart things that can connect without human intervention. However, IoT …
quality of life with smart things that can connect without human intervention. However, IoT …
[PDF][PDF] Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks
IoT networks are witnessing a rapid growth in various domains of our daily life, offering more
attractive features in terms of measurement accuracy, easy implementation and affordable …
attractive features in terms of measurement accuracy, easy implementation and affordable …