Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Extending the technology acceptance model to account for social influence: Theoretical bases and empirical validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution
toward understanding IS usage and IS acceptance behaviors. However, as noted by several …
toward understanding IS usage and IS acceptance behaviors. However, as noted by several …
Rooting our rumor sources in online social networks: The value of diversity from multiple observations
Z Wang, W Dong, W Zhang… - IEEE Journal of Selected …, 2015 - ieeexplore.ieee.org
This paper addresses the problem of rumor source detection with multiple observations,
from a statistical point of view of a spreading over a network, based on the susceptible …
from a statistical point of view of a spreading over a network, based on the susceptible …
Malicious Web traffic detection for Internet of Things environments
Abstract The Internet of Things (IoT) is gradually becoming an infrastructure, providing a
wide range of applications, from health monitoring to industrial control and many other social …
wide range of applications, from health monitoring to industrial control and many other social …
Hmm-web: A framework for the detection of attacks against web applications
Nowadays, the web-based architecture is the most frequently used for a wide range of
internet services, as it allows to easily access and manage information and software on …
internet services, as it allows to easily access and manage information and software on …
Formal analysis of the kaminsky DNS cache-poisoning attack using probabilistic model checking
We use the probabilistic model checker PRISM to formally model and analyze the highly
publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an …
publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an …
Anomaly detection in bacnet/ip managed building automation systems
M Peacock - 2019 - ro.ecu.edu.au
Abstract Building Automation Systems (BAS) are a collection of devices and software which
manage the operation of building services. The BAS market is expected to be a $19.25 …
manage the operation of building services. The BAS market is expected to be a $19.25 …
Multi-observer privacy-preserving hidden markov models
Detection of malicious traffic and network health problems would be much easier if Internet
Service Providers (ISPs) shared their data. Unfortunately, they are reluctant to share …
Service Providers (ISPs) shared their data. Unfortunately, they are reluctant to share …
Owleye: An advanced detection system of web attacks based on hmm
Nowdays web services plays an important part in our daily life, and the security of web
servers and applications has become one of the key topics in cyber security. Web request …
servers and applications has become one of the key topics in cyber security. Web request …
A hidden markov model combined with markov games for intrusion detection in cloud
Cloud computing has evolved as a new paradigm for management of an infrastructure and
gained ample consideration in both industrial and academic area of research. A hidden …
gained ample consideration in both industrial and academic area of research. A hidden …
Intrusion detection in computer systems using multiple classifier systems
Summary Multiple Classifier Systems (MCS) have been applied successfully in many
different research fields, among them the detection of intrusions in computer systems. As an …
different research fields, among them the detection of intrusions in computer systems. As an …