Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Evaluation of naïve Bayesian algorithms for cyber-attacks detection in wireless sensor networks
Wireless Sensor Network (WSN) is one of the Internet of Things (IoT) operating platforms,
which has proliferated into a wide range of applications. These networks comprise many …
which has proliferated into a wide range of applications. These networks comprise many …
A comparative study of machine learning models for cyber-attacks detection in wireless sensor networks
Wireless Sensor Network is a key technology for Internet of Things, but it is an example of
energy-restricted networks. In such networks with a large number of deployed sensors with …
energy-restricted networks. In such networks with a large number of deployed sensors with …
A lightweight multilayer machine learning detection system for cyber-attacks in WSN
A key technology that empowers low-cost and low-power Internet of Things (IoT) systems
implementation is the Wireless Sensor Network (WSN); however, WSNs are susceptible to …
implementation is the Wireless Sensor Network (WSN); however, WSNs are susceptible to …
ZHLS Security Enhancement by integrating SHA256, AES, DH in MANETS
BB Sundaram, MK Mishra… - Journal of Physics …, 2021 - iopscience.iop.org
In this century fast growing and progressive change of technology, Mobile Ad hoc Network
(MANET) which is a no centralized structure plays great role. The routing protocol in this …
(MANET) which is a no centralized structure plays great role. The routing protocol in this …
Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network‐Based E‐Healthcare System
The COVID‐19 pandemic has affected people's lives in all aspects. This pandemic has
raised the usage of ubiquitous networks such as mobile ad hoc networks (MANETs) for …
raised the usage of ubiquitous networks such as mobile ad hoc networks (MANETs) for …
[PDF][PDF] High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications
In this research work, a fast and lightweight AES-128 cypher based on the **linx ZCU102
FPGA board is presented, suitable for 5G communications. In particular, both encryption and …
FPGA board is presented, suitable for 5G communications. In particular, both encryption and …
[PDF][PDF] Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques.
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the
Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload …
Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload …
[PDF][PDF] WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying Search Algorithm
The routing protocol is considered the backbone of network communication. However,
mobility and bandwidth availability make optimizing broadcast message flooding a problem …
mobility and bandwidth availability make optimizing broadcast message flooding a problem …
General rules of evaluating binary number divisibility on prime numbers
This research paper is to define new rule to find the divisibility of stream of binary on any
prime numbers 3, 5, 7…… with reminder 0. In general, the divisibility of binary numbers is …
prime numbers 3, 5, 7…… with reminder 0. In general, the divisibility of binary numbers is …
[HTML][HTML] IJCNC 03
WK Ahmed, MN bin Mohd Warip, WK Abduljabbar… - ijcnc.com
The routing protocol is considered the backbone of network communication. However,
mobility and bandwidth availability make optimizing broadcast message flooding a problem …
mobility and bandwidth availability make optimizing broadcast message flooding a problem …