Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …
[HTML][HTML] Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine
Elections and voting play a crucial role in the development of a democratic society, enabling
the public to express their views and participate in the decision-making process. Voting …
the public to express their views and participate in the decision-making process. Voting …
Recovery of Deleted Files in the NTFS File System using Python and PyTSK3
K Venkatesh, RS Tharshan, N Karthik… - … Conference on IoT …, 2024 - ieeexplore.ieee.org
Data loss due to accidental or malicious deletion of files poses significant challenges in
digital data management and forensics. The ability to efficiently and reliably recover deleted …
digital data management and forensics. The ability to efficiently and reliably recover deleted …
[PDF][PDF] Blockchain-Enabled GDPR Compliance for Personal Data Processing in Agricultural Supply Chains Using Smart Contracts
J Umair, A Wahab - 2024 - researchgate.net
In the context of increasingly stringent data protection regulations, ensuring GDPR
compliance within agricultural supply chains presents significant challenges due to the …
compliance within agricultural supply chains presents significant challenges due to the …
[PDF][PDF] Real-Time Cyberbullying Detection in Online Social Networks with CNN-BiLSTM-GRU Models: A Fog-Based IoT Approach
T Hussain, A Wahab - 2024 - researchgate.net
Real-time cyberbullying detection in online social networks presents significant challenges
due to the dynamic and unstructured nature of digital interactions. This study proposes a fog …
due to the dynamic and unstructured nature of digital interactions. This study proposes a fog …
[PDF][PDF] Optimizing SQLite Forensics for Android Devices: A GDPR-Compliant Data Processing Framework for Latency-Sensitive IoT Services
W Nasir, I Hussain - 2024 - researchgate.net
This study presents an optimized framework for SQLite forensics tailored to Android devices,
emphasizing GDPR-compliant data processing for latency-sensitive IoT services. SQLite …
emphasizing GDPR-compliant data processing for latency-sensitive IoT services. SQLite …
[PDF][PDF] Smart Contracts for Agricultural Supply Chain Management: Blockchain Compliance and GDPR Personal Data Protection
N Ahmad, I Hussain - 2024 - researchgate.net
This study explores the integration of smart contracts within agricultural supply chain
management, focusing on blockchain compliance and GDPR personal data protection …
management, focusing on blockchain compliance and GDPR personal data protection …
[PDF][PDF] Mobile IoT-Enabled Eye-Tracking Systems for Self-Directed Learning: A Fog-Based Approach to Data Processing
S Akhtar, S Sidrish - 2024 - researchgate.net
Mobile IoT-enabled eye-tracking systems offer a novel approach to enhancing self-directed
learning by leveraging real-time data processing to tailor educational experiences. This …
learning by leveraging real-time data processing to tailor educational experiences. This …
[PDF][PDF] Integrating Barcode Recognition and Preferences Monitoring into Latency-Sensitive IoT Services Using a Fog-Based Framework
D Raza, N Kallinteris - 2024 - researchgate.net
The integration of barcode recognition and preferences monitoring into latency-sensitive IoT
services represents a significant advancement in optimizing user experience and …
services represents a significant advancement in optimizing user experience and …
[PDF][PDF] Automated SQLite Forensics for Android Devices: A Data Processing Approach Compliant with GDPR and Blockchain Standards
U Bashir, S Sidrish - 2024 - researchgate.net
As the use of Android devices continues to proliferate, the need for effective forensic
techniques to handle and analyze data from these devices has become increasingly critical …
techniques to handle and analyze data from these devices has become increasingly critical …