Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks
The demand for the Internet of Things (IoT) has significantly increased in the current
scenario; specific sectors that require IoT include industrial automation, home control, health …
scenario; specific sectors that require IoT include industrial automation, home control, health …
A hierarchical network management strategy for distributed CIIoT with imperfect CSI
F Yang, S Zhang, C Liu, J Huang, T Yu… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the distributed Cognitive Industrial Internet of Things (CIIoT), since industrial devices may
self-organize to determine their connection and dispersion and the network may be …
self-organize to determine their connection and dispersion and the network may be …
Unleashing the power of artificial intelligence in Islamic banking: A case study of Bank Syariah Indonesia (BSI)
This research examines the challenges and opportunities of AI integration in Islamic banks
through a case study of Bank Syariah Indonesia. A qualitative method was applied using an …
through a case study of Bank Syariah Indonesia. A qualitative method was applied using an …
[HTML][HTML] An intelligent fl-based vehicle route optimization protocol for green and sustainable iot connected iov
Abstract The intelligent Internet of Vehicles (IoV) provides superior results in effectively
addressing complex transportation challenges. Predicting vehicle traffic, crashes, demand …
addressing complex transportation challenges. Predicting vehicle traffic, crashes, demand …
[HTML][HTML] A computer-aided feature-based encryption model with concealed access structure for medical Internet of Things
One of the Internet of Things (IoT) security issues is the secure sharing and granular
management of data access. This study recommends a feature-based encryption scheme …
management of data access. This study recommends a feature-based encryption scheme …
Exploring the Landscape: A Systematic Review of Artificial Intelligence Techniques in Cybersecurity
In today's interconnected world, the dissemination of vast amounts of information through the
internet has become ubiquitous, facilitating seamless communication and connectivity …
internet has become ubiquitous, facilitating seamless communication and connectivity …
An optimized bio-inspired localization routing technique for sustainable IIoT networks & green cities
Abstract The industrial Internet of Things (IIoTs) network life is shortened due to sensor node
(SN) energy limitations and computational capability. As a result, optimum node location …
(SN) energy limitations and computational capability. As a result, optimum node location …
An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks
Privacy and security present significant challenges in wireless sensor networks (WSNs). In
order to enhance security, the sensor network is equipped with high throughput. While the …
order to enhance security, the sensor network is equipped with high throughput. While the …