Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks
ZigBee has been widely recognized as an important enabling technique for Internet of
Things (IoT). However, the ZigBee nodes are normally resource-limited, making the network …
Things (IoT). However, the ZigBee nodes are normally resource-limited, making the network …
Security threats and countermeasures of MAC layer in cognitive radio networks
Cognitive radio is a promising technology proposed to solve the scarcity of the radio
spectrum by opportunistically allocating the idle channels of the licensed users to …
spectrum by opportunistically allocating the idle channels of the licensed users to …
Energy depletion attacks in low power wireless networks
Low Power Wireless (LPW) networks have recently been emerging as key candidates to
offer affordable connectivity for the constrained devices in the Internet of Things (IoT) …
offer affordable connectivity for the constrained devices in the Internet of Things (IoT) …
[PDF][PDF] A Reliable Trustworthy Approach Based on Node Behavior Prediction for Secure Routing in MANET.
An unstructured version of a traditional wireless network provides a mobile ad hoc network
(MANET) that is well suited for emergencies. However, due to lack of infrastructure and …
(MANET) that is well suited for emergencies. However, due to lack of infrastructure and …
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs
In this paper, we address the problem of greediness in IEEE 802.11 CSMA/CA protocol in
Vehicular Ad-hoc Networks (VANETs). In VANETs some nodes might misbehave by …
Vehicular Ad-hoc Networks (VANETs). In VANETs some nodes might misbehave by …
Reliable code disseminations through opportunistic communication in vehicular wireless networks
Large numbers of software-defined sensor devices have formed a basic infrastructure for
data collection. One of the challenges is how to update the program codes of devices in a …
data collection. One of the challenges is how to update the program codes of devices in a …
Adaptive jammer localization in wireless networks
T Wang, X Wei, J Fan, T Liang - Computer Networks, 2018 - Elsevier
The shared nature of wireless communication, the open access to wireless medium, the
tightly coupled design principle of wireless network protocol and the scarcity of radio …
tightly coupled design principle of wireless network protocol and the scarcity of radio …
Misbehavior detection in Wi-Fi/LTE coexistence over unlicensed bands
We address the problem of detecting misbehavior in the coexistence etiquette between LTE
and Wi-Fi systems operating in the 5GHz U-NII unlicensed bands. We define selfish …
and Wi-Fi systems operating in the 5GHz U-NII unlicensed bands. We define selfish …
A green approach for selfish misbehavior detection in 802.11-based wireless networks
IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN.
Its Medium Access control (MAC) layer assumes that the devices adhere to the standard's …
Its Medium Access control (MAC) layer assumes that the devices adhere to the standard's …