Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security issues of mobile ad hoc and sensor networks
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …
of wireless links, the limited physical protection of nodes, the dynamically changing …
A survey on the usability and practical applications of graphical security models
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
Securing ad hoc routing protocols
We consider the problem of incorporating security mechanisms into routing protocols for ad
hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV [21] …
hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV [21] …
Position verification approaches for vehicular ad hoc networks
Intervehicle communication is regarded as one of the major applications of mobile ad hoc
networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks …
networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks …
CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes
E Hernandez-Orallo, MDS Olmos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …
A survey of survivability in mobile ad hoc networks
MN Lima, AL Dos Santos… - … Communications surveys & …, 2009 - ieeexplore.ieee.org
Many efforts have been done towards secure MANETs, but the conventional lines of defense
are still inefficient to put all attacks off. This article examines survivable approaches whose …
are still inefficient to put all attacks off. This article examines survivable approaches whose …
Improved security in geographic ad hoc routing through autonomous position verification
T Leinmüller, C Maihöfer, E Schoch… - Proceedings of the 3rd …, 2006 - dl.acm.org
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc
networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks …
networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks …
Efficient selfish node detection using SVM in IoT‐MANET environment
The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks
environment is typically dependent on their selfless attitude. Whenever a node needs to …
environment is typically dependent on their selfless attitude. Whenever a node needs to …
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks
Abstract The Wireless Sensor Networks (WSNs) used for the monitoring applications like
pipelines carrying oil, water, and gas; perimeter surveillance; border monitoring; and …
pipelines carrying oil, water, and gas; perimeter surveillance; border monitoring; and …
Fighting against packet drop** misbehavior in multi-hop wireless ad hoc networks
A Baadache, A Belmehdi - Journal of Network and Computer Applications, 2012 - Elsevier
In multi-hop wireless ad hoc networks, the packets are forwarded through intermediate
nodes along the source–destination path. Without having any control on packets forwarding …
nodes along the source–destination path. Without having any control on packets forwarding …