Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks
In recent years, wireless sensor networks (WSNs) have played a major role in applications
such as tracking and monitoring in remote environments. Designing energy efficient …
such as tracking and monitoring in remote environments. Designing energy efficient …
Trust-based secure clustering in WSN-based intelligent transportation systems
Increasing the number of vehicles on roads leads to congestion and safety problems.
Wireless Sensor Network (WSN) is a promising technology providing Intelligent …
Wireless Sensor Network (WSN) is a promising technology providing Intelligent …
A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions
YG Yue, P He - Information Fusion, 2018 - Elsevier
With the development and popularization of mobile terminal technology, mobile wireless
sensor networks (MWSNs) have become a new evolution trend in wireless sensor networks …
sensor networks (MWSNs) have become a new evolution trend in wireless sensor networks …
[HTML][HTML] A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption
Despite the great efforts to secure wireless sensor network (WSN), the dynamic nature and
the limited resources of sensor nodes make searching for a secure and optimal network …
the limited resources of sensor nodes make searching for a secure and optimal network …
ILLIA: Enabling -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries
With the increasing popularity of location-based services (LBSs), it is of paramount
importance to preserve one's location privacy. The commonly used location privacy …
importance to preserve one's location privacy. The commonly used location privacy …
[HTML][HTML] Practical access control for sensor networks in the context of the Internet of Things
Wireless sensor network (WSN) plays an important role in military sensing and tracking,
target tracking, and environment monitoring. To query of the network to get useful …
target tracking, and environment monitoring. To query of the network to get useful …
Information-centric mobile networks: A survey, discussion, and future research directions
Information-centric networking (ICN) and its fruition, the named data networking (NDN) is a
paradigm shift from host-centric address-based communication architecture to the content …
paradigm shift from host-centric address-based communication architecture to the content …
Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model
L Han, M Zhou, W Jia, Z Dalil, X Xu - Information sciences, 2019 - Elsevier
An effective security strategy for Wireless Sensor Networks (WSNs) is imperative to
counteract security threats. Meanwhile, energy consumption directly affects the network …
counteract security threats. Meanwhile, energy consumption directly affects the network …
An energy efficient encryption method for secure dynamic WSN
Clustering methods have been developed to improve network life of wireless sensor network
(WSN), yet the dynamic nature of sensor clusters and limited memory and processing power …
(WSN), yet the dynamic nature of sensor clusters and limited memory and processing power …