Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security attacks in VANETs: Communication, applications and challenges
Over the past few decades, the intelligent transportation system (ITS) have emerged with
new technologies and becomes the data-driven ITS, because the substantial amount of data …
new technologies and becomes the data-driven ITS, because the substantial amount of data …
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …
Security threats and solutions in MANETs: A case study using AODV and SAODV
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts.
Driven by the unique and considerable difficulties of providing security arising from the …
Driven by the unique and considerable difficulties of providing security arising from the …
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
Device security is one of the major challenges for successful implementation of Internet of
Things and fog computing environment in current IT space. Researchers and Information …
Things and fog computing environment in current IT space. Researchers and Information …
A survey of attacks and countermeasures in mobile ad hoc networks
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
[PDF][PDF] HIASA: Hybrid improved artificial bee colony and simulated annealing based attack detection algorithm in mobile ad-hoc networks (MANETs)
PS Prasad, SKM Rao - Bonfring International Journal of Industrial …, 2017 - academia.edu
A Mobile Ad-hoc Network (MANET) is a persistently self configuring, infrastructure-less
network of mobile devices in which every device is wireless, be in motion devoid of …
network of mobile devices in which every device is wireless, be in motion devoid of …
A specification-based intrusion detection system for AODV
CY Tseng, P Balasubramanyam, C Ko… - Proceedings of the 1st …, 2003 - dl.acm.org
The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad
hoc networks, offers quick adaptation to dynamic link conditions, low processing and …
hoc networks, offers quick adaptation to dynamic link conditions, low processing and …
Insider attacker detection in wireless sensor networks
F Liu, X Cheng, D Chen - IEEE INFOCOM 2007-26th IEEE …, 2007 - ieeexplore.ieee.org
Though destructive to network functions, insider attackers are not detectable with only the
classic cryptography-based techniques. Many mission-critic sensor network applications …
classic cryptography-based techniques. Many mission-critic sensor network applications …
A study of different types of attacks on multicast in mobile ad hoc networks
HL Nguyen, UT Nguyen - Ad Hoc Networks, 2008 - Elsevier
We present a simulation-based study of the impacts of different types of attacks on mesh-
based multicast in mobile ad hoc networks (MANETs). We consider the most common types …
based multicast in mobile ad hoc networks (MANETs). We consider the most common types …
[LLIBRE][B] Security for wireless ad hoc networks
F Anjum, P Mouchtaris - 2007 - books.google.com
This book addresses the problems and brings solutions to the security issues of ad-hoc
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …