Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Simulating opportunistic networks: Survey and future directions
Simulation is one of the most powerful tools we have for evaluating the performance of
opportunistic networks (OppNets). In this paper, we focus on available tools and models …
opportunistic networks (OppNets). In this paper, we focus on available tools and models …
Evaluating how smartphone contact tracing technology can reduce the spread of infectious diseases: The case of COVID-19
Detecting and controlling the diffusion of infectious diseases such as COVID-19 is crucial to
managing epidemics. One common measure taken to contain or reduce diffusion is to detect …
managing epidemics. One common measure taken to contain or reduce diffusion is to detect …
Selfishness in mobile ad-hoc networks: A literature review on detection techniques and prevention mechanisms
Constant connectivity is one of the most challenging requirements modern communication
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …
[HTML][HTML] Blockchain-based lightweight trust management in mobile ad-hoc networks
As a trending and interesting research topic, in recent years, researchers have been
adopting the blockchain in the wireless ad-hoc environment. Owing to its strong …
adopting the blockchain in the wireless ad-hoc environment. Owing to its strong …
Evaluating the effectiveness of COVID-19 Bluetooth-Based smartphone contact tracing applications
One of the strategies to control the spread of infectious diseases is based on the use of
specialized applications for smartphones. These apps offer the possibility, once individuals …
specialized applications for smartphones. These apps offer the possibility, once individuals …
WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks
Wormhole attack is a challenging security threat to wireless sensor networks which results in
disrupting most of the routing protocols as this attack can be triggered in different modes. In …
disrupting most of the routing protocols as this attack can be triggered in different modes. In …
Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes
Abstract Delay Tolerant Network (DTN) can be characterized as a heterogeneous network of
nodes in which nodes mobility is high and resources are limited to transmit messages. In …
nodes in which nodes mobility is high and resources are limited to transmit messages. In …
Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks
Malicious node detection in vehicular ad hoc network (VANET) has always been a research
hot spot. An efficient misbehavior detection scheme is needed to avoid and reduce the factor …
hot spot. An efficient misbehavior detection scheme is needed to avoid and reduce the factor …
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …
working and vulnerability of underlined standard routing protocols is exposed to various …
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network
resources, thus improve the data delivery performance. Most of existing detection schemes …
resources, thus improve the data delivery performance. Most of existing detection schemes …