Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BOK][B] Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote
environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes …
environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes …
Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs
Mobile ad hoc network (MANET) is a self-configuring and infrastructure less network in
which the nodes are considered to move autonomously through the interfaces of wireless …
which the nodes are considered to move autonomously through the interfaces of wireless …
[HTML][HTML] A novel anomaly behavior detection scheme for mobile ad hoc networks
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms
of confidentially, authentication, integrity, authorization, key management, and abnormal …
of confidentially, authentication, integrity, authorization, key management, and abnormal …
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Tactical Mobile Ad-hoc NETworks (T-MANETs) are mainly used in self-configuring automatic
vehicles and robots (also called nodes) for the rescue and military operations. A high …
vehicles and robots (also called nodes) for the rescue and military operations. A high …
Adaptive trust-aware decentralized information flow control
C Skandylas, N Khakpour… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Modern software systems are decentralized, distributed, and dynamic, and consequently,
require decentralized mechanisms to enforce security. In this paper, we propose an adaptive …
require decentralized mechanisms to enforce security. In this paper, we propose an adaptive …
AT-DIFC+: Toward Adaptive and Trust-Aware Decentralized Information Flow Control
Modern software systems and their corresponding architectures are increasingly
decentralized, distributed, and dynamic. As a consequence, decentralized mechanisms are …
decentralized, distributed, and dynamic. As a consequence, decentralized mechanisms are …
Summary and Future Directions of the Book
and Future Directions of the Book | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart 1.Home …
Account Menu Find a journal Publish with us Track your research Search Cart 1.Home …
Self-adaptive trust-aware decentralized information flow control, extended version
C Skandylas, N Khakpour, J Andersson - 2020 - diva-portal.org
Modern software systems and their corresponding architectures are decentralized,
distributed, and dynamic. As a consequence, decentralized mechanisms are also required …
distributed, and dynamic. As a consequence, decentralized mechanisms are also required …
Mitigate black hole attack using bee optimised weighted trust with AODV in MANET
Mobile ad hoc network (MANET) is a decentralised network that can be used without any
fixed setup or infrastructure and offers unlimited opportunities in all fields. Both the …
fixed setup or infrastructure and offers unlimited opportunities in all fields. Both the …