Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Edge computing and sensor-cloud: Overview, solutions, and directions
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
A survey on security attacks in VANETs: Communication, applications and challenges
Over the past few decades, the intelligent transportation system (ITS) have emerged with
new technologies and becomes the data-driven ITS, because the substantial amount of data …
new technologies and becomes the data-driven ITS, because the substantial amount of data …
[HTML][HTML] Blockchain-based recommender systems: Applications, challenges and future opportunities
Recommender systems have been widely used in different application domains including
energy-preservation, e-commerce, healthcare, social media, etc. Such applications require …
energy-preservation, e-commerce, healthcare, social media, etc. Such applications require …
A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing
The Internet of Things (IoT)-Cloud combines the IoT and cloud computing, which not only
enhances the IoT's capability but also expands the scope of its applications. However, it …
enhances the IoT's capability but also expands the scope of its applications. However, it …
Trust management in a blockchain based fog computing platform with trustless smart oracles
Trust is a crucial aspect when cyber-physical systems have to rely on resources and
services under ownership of various entities, such as in the case of Edge, Fog and Cloud …
services under ownership of various entities, such as in the case of Edge, Fog and Cloud …
The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications
The Fog computing paradigms are becoming popular means of utilizing resources optimally
by the IoT devices, extending quality of service to the vicinity of the user, and achieve fast …
by the IoT devices, extending quality of service to the vicinity of the user, and achieve fast …
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Trust-based secure routing schemes are more effective than cryptographic routing protocols
to convey energy-efficient data in WSNs since cryptographic protocols require high …
to convey energy-efficient data in WSNs since cryptographic protocols require high …
Edge-computing-based trustworthy data collection model in the internet of things
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …
satisfying the resource requirements for the emerging mobile applications such as the …
Economic perspective analysis of protecting big data security and privacy
This paper investigates the economic perspective analysis of protecting security and privacy
of big data. Traditionally, the pressing cyberthreats appear from emailed attachments …
of big data. Traditionally, the pressing cyberthreats appear from emailed attachments …
Coupling resource management based on fog computing in smart city systems
The smart city is set to be the next important stage in human history. It consists of numerous
Cyber-physical systems (CPS) that can be endowed with different levels of intelligence …
Cyber-physical systems (CPS) that can be endowed with different levels of intelligence …