Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A deep learning-based intrusion detection approach for mobile Ad-hoc network
The goal of the paper is to present a Stacked autoencoder approach for enhancing Intrusion
Detection Systems (IDSs) in Mobile Ad-Hoc Networks (MANETs). The paper proposes a …
Detection Systems (IDSs) in Mobile Ad-Hoc Networks (MANETs). The paper proposes a …
A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)
KS Prasanna, B Ramesh - Wireless Personal Communications, 2023 - Springer
In wireless communication systems, Wireless ad hoc network plays a significant role in the
research domain. MANET is also an ad hoc network that build a temporary network to …
research domain. MANET is also an ad hoc network that build a temporary network to …
Advanced intrusion detection in MANETs: A survey of machine learning and optimization techniques for mitigating black/gray hole attacks
Mobile Ad Hoc Networks (MANETs) are dynamic networks without fixed infrastructure,
making them particularly vulnerable to security threats such as black and gray hole attacks …
making them particularly vulnerable to security threats such as black and gray hole attacks …
Enhancing MANET Security through Federated Learning and Multiobjective optimization: A Trust-aware Routing Framework
Mobile ad hoc networks (MANETs) face significant challenges in maintaining secure and
efficient communication owing to their dynamic nature and vulnerability to security threats …
efficient communication owing to their dynamic nature and vulnerability to security threats …
Enhancing energy efficiency in buildings, optimization method and building management systems application for lower CO2 emissions
R Liang, PH Wang - Energy, 2024 - Elsevier
In this study, the impact of Building Management Systems (BMS) on energy consumption in
office buildings has been evaluated, with a focus on reducing energy costs and CO2 …
office buildings has been evaluated, with a focus on reducing energy costs and CO2 …
Crossover Boosted Grey Wolf Optimizer‐based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs
S Selvaraj, M Nanjappan… - Transactions on …, 2024 - Wiley Online Library
Abstract Mobile Ad hoc Networks (MANETs) is a self‐organizing networks without having a
fixed infrastructure for making them susceptible to security threats. Intrusion Detection …
fixed infrastructure for making them susceptible to security threats. Intrusion Detection …
Improved Multi-objective Particle Swarm Optimization in Software Engineering Supervision
P Yue, Z Wang - Decision Making: Applications in Management …, 2024 - dmame-journal.org
In the 21st century, the software industry has achieved great development. The development
complexity and volume of software projects are also continuously increasing. The design of …
complexity and volume of software projects are also continuously increasing. The design of …
Advancing security and efficiency in MANET using dynamic algorithm switching
MANET is widely utilized for interactions among devices without relying on a central
governing body. The frequent changes in network topologies expose it to various security …
governing body. The frequent changes in network topologies expose it to various security …
An integral cybersecurity approach using a many-objective optimization strategy
Data networks and computing devices have experienced exponential growth. Within a short
span of time, they have opened new digital frontiers while also bringing forth new threats …
span of time, they have opened new digital frontiers while also bringing forth new threats …
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks
Abstract In a Mobile Ad hoc Network (MANET), the network structure constantly evolves due
to the movement of devices, users, or nodes. The Black Hole Attack (BHA) is recognized as …
to the movement of devices, users, or nodes. The Black Hole Attack (BHA) is recognized as …