Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The Kano model analysis of features for mobile security applications
ML Yao, MC Chuang, CC Hsu - Computers & Security, 2018 - Elsevier
Abstract The Google Play app store is providing more than 200 mobile security applications
(MSAs) with abundant features. This study consolidates and extracts 12 main mobile …
(MSAs) with abundant features. This study consolidates and extracts 12 main mobile …
A brief review of new threats and countermeasures in digital crime and cyber terrorism
M Dawson - New Threats and Countermeasures in Digital Crime …, 2015 - igi-global.com
Cyber security is becoming the cornerstone of national security policies in many countries
around the world as it is an interest to many stakeholders, including utilities, regulators …
around the world as it is an interest to many stakeholders, including utilities, regulators …
Unmanned aerial vehicle smart device ground control station cyber security threat model
K Mansfield, T Eveleigh, TH Holzer… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
The Department of the Defense has transitioned smart devices into the battlefield as a
portable hand-held unmanned aerial vehicle ground control station without adequate cyber …
portable hand-held unmanned aerial vehicle ground control station without adequate cyber …
A three-way decision making approach to malware analysis using probabilistic rough sets
Malware analysis aims to identify malware by examining applications behaviour on the host
operating system. A common issue in malware analysis is how to mitigate and handle the …
operating system. A common issue in malware analysis is how to mitigate and handle the …
Securing the human: Employee security vulnerability risk in organizational settings
N Sebescen, J Vitak - Journal of the Association for Information …, 2017 - Wiley Online Library
As organizational security breaches increase, so too does the need to fully understand the
human factors that lead to these breaches and take the necessary steps to minimize threats …
human factors that lead to these breaches and take the necessary steps to minimize threats …
[BOOK][B] 5G: 2020 and Beyond
R Prasad - 2014 - library.oapen.org
The future society would be ushered in a new communication era with the emergence of 5G.
5G would be significantly different, especially, in terms of architecture and operation in …
5G would be significantly different, especially, in terms of architecture and operation in …
Decision Trees Unleashed: Simplifying IoT Malware Detection With Advanced AI Techniques
This chapter presents an in-depth study on the application of decision tree-based classifiers
for the detection of malware in internet of things (IoT) environments. With the burgeoning …
for the detection of malware in internet of things (IoT) environments. With the burgeoning …
User perceptions of the security of mobile applications
Y Elsantil - International Journal of E-Services and Mobile …, 2020 - igi-global.com
With the exponential increase in the use of mobile devices across the globe, there is a
concomitant need to understand how mobile users perceive the security of mobile …
concomitant need to understand how mobile users perceive the security of mobile …
Enhancing IoT Security: Leveraging Advanced Deep Learning Architectures for Proactive Botnet Detection and Network Resilience
RK Jones - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter explores the application of advanced deep learning architectures, namely
convolutional neural networks (CNNs) and recurrent neural networks (RNNs), for the …
convolutional neural networks (CNNs) and recurrent neural networks (RNNs), for the …
Analysis of Interdependency of ICCT Underlying Technologies and Related New Research Opportunities with Special Emphasis on Cyber Security and Forensic …
Abstract Information Communication and Computation technology (ICCT) is a 21st-century
name of Information Communication Technology (ICT) that covers a broader definition of …
name of Information Communication Technology (ICT) that covers a broader definition of …