Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the control of microgrids against cyber-attacks: A review of methods and applications
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …
microgrids (MGs) has been developed due to better controllability of distributed energy …
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …
among researchers in the development of theoretical and practical concepts, and their …
Machine learning based approach to detect wormhole attack in VANETs
VANET is one of the key enabling technologies for connected and autonomous vehicles
(CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for …
(CAVs). In a vehicular plane of the VANETs, vehicles communicate with each other for …
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh
networks (WMNs) known as selective forwarding attack (aka gray hole attacks). With such an …
networks (WMNs) known as selective forwarding attack (aka gray hole attacks). With such an …
Review of the techniques against the wormhole attacks on wireless sensor networks
G Farjamnia, Y Gasimov, C Kazimov - Wireless Personal Communications, 2019 - Springer
With the advancement of technology, the application of Wireless Sensor Networks (WSNs)
has increased in various fields, such as; military, medical and business. WSNs have the …
has increased in various fields, such as; military, medical and business. WSNs have the …
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …
that can bypass cryptographic measures and derail the entire communication network. It is …
Securing underwater sensor networks against routing attacks
With the advances in technology, there has been an increasing interest both from research
and industrial communities in the use of Underwater Wireless Sensor Networks (UWSNs) …
and industrial communities in the use of Underwater Wireless Sensor Networks (UWSNs) …
Notice of Violation of IEEE Publication Principles: A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks
M Jain, H Kandwal - … on Advances in Computing, Control, and …, 2009 - ieeexplore.ieee.org
Notice of Violation of IEEE Publication Principles" A Survey on Complex Wormhole Attack in
Wireless Ad Hoc Networks" by M. Jain and H. Kandwal in the Proceedings of the …
Wireless Ad Hoc Networks" by M. Jain and H. Kandwal in the Proceedings of the …
[PDF][PDF] A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks
A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in
wireless Ad Hoc Networks Page 1 (IJCSIS) International Journal of Computer Science and …
wireless Ad Hoc Networks Page 1 (IJCSIS) International Journal of Computer Science and …
Geographic wormhole detection in wireless sensor networks
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly
susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the …
susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the …