Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Privacy in mobile technology for personal healthcare
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …
survey, we examine the privacy requirements of mobile computing technologies that have …
[PDF][PDF] Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
Wireless networks are being integrated into the modern automobile. The security and
privacy implications of such in-car networks, however, have are not well understood as their …
privacy implications of such in-car networks, however, have are not well understood as their …
How talkative is your mobile device? An experimental study of Wi-Fi probe requests
J Freudiger - Proceedings of the 8th ACM conference on security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …
mobile devices can request information from access points and accelerate the Wi-Fi …
Estimating crowd densities and pedestrian flows using wi-fi and bluetooth
The rapid deployment of smartphones as all-purpose mobile computing systems has led to a
wide adoption of wireless communication systems such as Wi-Fi and Bluetooth in mobile …
wide adoption of wireless communication systems such as Wi-Fi and Bluetooth in mobile …
Secure friend discovery in mobile social networks
Mobile social networks extend social networks in the cyberspace into the real world by
allowing mobile users to discover and interact with existing and potential friends who …
allowing mobile users to discover and interact with existing and potential friends who …
A blockchain-based mutual authentication method to secure the electric vehicles' TPMS
Despite the widespread use of radio frequency identification and wireless connectivity such
as near field communication in electric vehicles, their security and privacy implications in Ad …
as near field communication in electric vehicles, their security and privacy implications in Ad …
On the optimal placement of mix zones
In mobile wireless networks, third parties can track the location of mobile nodes by
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …
Protecting privacy of {BLE} device users
Bluetooth Low Energy (BLE) has emerged as an attractive technology to enable Internet of
Things (IoTs) to interact with others in their vicinity. Our study of the behavior of more than …
Things (IoTs) to interact with others in their vicinity. Our study of the behavior of more than …
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive for the majority of security
protocols. However, an adversary can track the location of mobile nodes by monitoring …
protocols. However, an adversary can track the location of mobile nodes by monitoring …