Survey on Multi-Document Summarization: Systematic Literature Review
In this era of information technology, abundant information is available on the internet in the
form of web pages and documents on any given topic. Finding the most relevant and …
form of web pages and documents on any given topic. Finding the most relevant and …
Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent Transportation
Systems (ITS) by facilitating communication between vehicles and infrastructure. This …
Systems (ITS) by facilitating communication between vehicles and infrastructure. This …
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …
that can bypass cryptographic measures and derail the entire communication network. It is …
[PDF][PDF] Current Security Threats in Applications of Wireless Sensor Network
Wireless Sensor Networks (WSNs) are either homogeneous or heterogeneous, depending
on whether the network is made up of distributed nodes with the same properties; …
on whether the network is made up of distributed nodes with the same properties; …
Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree
D Chen, A Aljohani - Mobile Networks and Applications, 2024 - Springer
Data protection shares sensitive data with authorized users over a wireless communication
network (WCN). To protect the data, a secured sharing method for WCNs is required, which …
network (WCN). To protect the data, a secured sharing method for WCNs is required, which …
Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack
H Shahid, H Ashraf, NZ Jhanjhi… - … With Generative AI …, 2025 - igi-global.com
Security is a major problem in wireless sensor networks (WSN) because they are vulnerable
to a variety of dangerous threats, the deadliest of which is the wormhole assault. These …
to a variety of dangerous threats, the deadliest of which is the wormhole assault. These …
ESPAR array design for the UHF RFID wireless sensor communication system
In this paper, in order to improve the received signal strength (RSS) and signal quality, three
arrays of electronically steerable parasitic array radiator (ESPAR) antennas are suggested …
arrays of electronically steerable parasitic array radiator (ESPAR) antennas are suggested …
ML-Based Detection of Sybil Attack on MANETS
Abstract Mobile Ad hoc Networks (MANETs) play an important role in the technological era
by enabling wireless communication in dynamic and infrastructure-free contexts. Because of …
by enabling wireless communication in dynamic and infrastructure-free contexts. Because of …
Query Reformulation Approach Using Domain Specific Ontology
Query reformulation is a fundamental task in information retrieval systems aimed at
improving the accuracy and relevance of search results. This abstract presents a query …
improving the accuracy and relevance of search results. This abstract presents a query …
Comparative Analysis of Secure Range Free DV-Hop Localization algorithms against wormhole attack in WSNs
Node localization is a requisite in wireless sensor networks (WSNs) because of their far-
reaching applications in many fields like surveillance, tracking, security, etc. A major …
reaching applications in many fields like surveillance, tracking, security, etc. A major …