Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
TrustLite: A security architecture for tiny embedded devices
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
Beauty and the burst: Remote identification of encrypted video streams
The MPEG-DASH streaming video standard contains an information leak: even if the stream
is encrypted, the segmentation prescribed by the standard causes content-dependent …
is encrypted, the segmentation prescribed by the standard causes content-dependent …
Packet-level signatures for smart home devices
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
[PDF][PDF] Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
Wireless networks are being integrated into the modern automobile. The security and
privacy implications of such in-car networks, however, have are not well understood as their …
privacy implications of such in-car networks, however, have are not well understood as their …
Hawkes processes for events in social media
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
Tracking unmodified smartphones using wi-fi monitors
Smartphones with Wi-Fi enabled periodically transmit Wi-Fi messages, even when not
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …
Side-channel leaks in web applications: A reality today, a challenge tomorrow
With software-as-a-service becoming mainstream, more and more applications are
delivered to the client through the Web. Unlike a desktop application, a web application is …
delivered to the client through the Web. Unlike a desktop application, a web application is …
[PDF][PDF] Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
Recent work has shown that properties of network traffic that remain observable after
encryption, namely packet sizes and timing, can reveal surprising information about the …
encryption, namely packet sizes and timing, can reveal surprising information about the …
Skypemorph: Protocol obfuscation for tor bridges
The Tor network is designed to provide users with low-latency anonymous communications.
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …
Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users' behavior of balancing perceived …
H Lee, H Park, J Kim - International Journal of Human-Computer Studies, 2013 - Elsevier
Despite the rapid growth of context-aware systems and ubiquitous computing, the factors
influencing users' decision to share their context information in a social setting are poorly …
influencing users' decision to share their context information in a social setting are poorly …