Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive
volumes of data explosion. The generated data is collected and shared using edge-based …
volumes of data explosion. The generated data is collected and shared using edge-based …
Information sharing in cybersecurity: A review
A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …
identified papers based on their main focus and methodological approaches implemented to …
How Industrial Internet Platforms guide high-quality information sharing for semiconductor manufacturing? An evolutionary game model
N Feng, Y Zhang, B Ren, R Dou, M Li - Computers & Industrial Engineering, 2023 - Elsevier
To keep up with the times, the semiconductor manufacturing industry needs to break down
barriers to data transmission. Since the manufacturing process of semiconductor materials is …
barriers to data transmission. Since the manufacturing process of semiconductor materials is …
[HTML][HTML] Supply chain partnership and innovation performance of manufacturing firms: Mediating effect of knowledge sharing and moderating effect of knowledge …
H Shan, D Bai, Y Li, J Shi, S Yang - Journal of Innovation & Knowledge, 2023 - Elsevier
Affected by complicated issues, such as regional conflicts, trade wars, and the COVID-19
pandemic, manufacturing firms face enormous challenges in reconstructing the global …
pandemic, manufacturing firms face enormous challenges in reconstructing the global …
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Y Shen, C Shepherd, CM Ahmed, S Shen, X Wu… - … Applications of Artificial …, 2024 - Elsevier
Privacy preservation of the big data generated, deposited, and communicated by smart IoT
(Internet of Things) nodes is the major challenge in IoT networks. Anonymization, encryption …
(Internet of Things) nodes is the major challenge in IoT networks. Anonymization, encryption …
[HTML][HTML] Knowledge absorption for cyber-security: The role of human beliefs
We investigate how human beliefs are associated with the absorption of specialist
knowledge that is required to produce cyber-security. We ground our theorizing in the …
knowledge that is required to produce cyber-security. We ground our theorizing in the …
A shared cyber threat intelligence solution for smes
M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often
do not have the means to counter these attacks. Therefore, cybersecurity researchers and …
do not have the means to counter these attacks. Therefore, cybersecurity researchers and …
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments
The primary objective of the current study is to analytically examine the economic benefits
an organization can obtain by receiving and processing cyber threat intelligence (CTI) …
an organization can obtain by receiving and processing cyber threat intelligence (CTI) …
Interdependency analysis in security investment against strategic attacks
M Ezhei, B Tork Ladani - Information Systems Frontiers, 2020 - Springer
Abstract Information security investment is of high importance in management of IT
infrastructure. There are many researches focused on game theoretical modeling and …
infrastructure. There are many researches focused on game theoretical modeling and …
Novel trajectory data publishing method under differential privacy
X Zhao, Y Dong, D Pi - Expert Systems with Applications, 2019 - Elsevier
The existing location-based services have collected a large amount of user trajectory data,
and if these data are directly released without any processing, the user's personal privacy …
and if these data are directly released without any processing, the user's personal privacy …