Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
IoT trust and reputation: a survey and taxonomy
IoT is one of the fastest-growing technologies and it is estimated that more than a billion
devices would be utilised across the globe by the end of 2030. To maximise the capability of …
devices would be utilised across the globe by the end of 2030. To maximise the capability of …
[HTML][HTML] Firewall best practices for securing smart healthcare environment: A review
Smart healthcare environments are growing at a rapid pace due to the services and benefits
offered to healthcare practitioners and to patients. At the same time, smart healthcare …
offered to healthcare practitioners and to patients. At the same time, smart healthcare …
Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks
M Kumar, P Mukherjee, K Verma… - … on Network Science …, 2021 - ieeexplore.ieee.org
Wireless Sensors Networks (WSN) is the self-configured Wireless Ad hoc Networks
(WANET) for Internet of Things (IoT) which consists of a huge measure of resource …
(WANET) for Internet of Things (IoT) which consists of a huge measure of resource …
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Trust-based secure routing schemes are more effective than cryptographic routing protocols
to convey energy-efficient data in WSNs since cryptographic protocols require high …
to convey energy-efficient data in WSNs since cryptographic protocols require high …
Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm
Y Han, H Hu, Y Guo - IEEe Access, 2022 - ieeexplore.ieee.org
Due to their working environments, limited resources and communication characteristics,
wireless sensor networks face some challenges including energy optimization and security …
wireless sensor networks face some challenges including energy optimization and security …
Edge-computing-based trustworthy data collection model in the internet of things
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …
satisfying the resource requirements for the emerging mobile applications such as the …
Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN
K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
In wireless sensor networks (WSNs), energy optimization and the provision of security are
the major design challenges. Since the wireless sensor devices are energy constrained, the …
the major design challenges. Since the wireless sensor devices are energy constrained, the …
A secure and dependable trust assessment (SDTS) scheme for industrial communication networks
Due to tamper-resistant sensor nodes and wireless media, Industrial Wireless Sensor
Networks (WSNs) are susceptible to various security threats that severely affect …
Networks (WSNs) are susceptible to various security threats that severely affect …
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network
Abstract The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things
(IoT) where the Things collaborate to provide remote patient health monitoring, also known …
(IoT) where the Things collaborate to provide remote patient health monitoring, also known …
A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network
B Pang, Z Teng, H Sun, C Du, M Li… - IEEE wireless …, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several
threats, one of which is dishonest recommendation attacks providing false trust values that …
threats, one of which is dishonest recommendation attacks providing false trust values that …