Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SnapMe if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it
The amount of media uploaded to the Web is still rapidly expanding. The ease-of-use of
modern smartphones in combination with the proliferation of high-speed mobile networks …
modern smartphones in combination with the proliferation of high-speed mobile networks …
A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts
Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are
becoming essential elements of our modern lives. Their large-scale pervasive deployment …
becoming essential elements of our modern lives. Their large-scale pervasive deployment …
Evaluating the threat of epidemic mobile malware
While mobile malware has played a relatively small role compared to the behemoth of
desktop malware, the changes both in the capability as well as in the proliferation of the …
desktop malware, the changes both in the capability as well as in the proliferation of the …
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
Multiple studies have demonstrated that the conventional method of learning is suboptimal
when our goal is to enhance individuals' genuine privacy behavior. This study introduces a …
when our goal is to enhance individuals' genuine privacy behavior. This study introduces a …
Towards privacy-preserving data dissemination in crowd-sensing middleware platform
R Sommerard, R Rouvoy - 11èmes journées francophones Mobilité …, 2016 - inria.hal.science
Crowd-sensing, also known as mobile crowdsourcing, is a growing research topic, which
consists in engaging end users in the process of gathering physical measurements in the …
consists in engaging end users in the process of gathering physical measurements in the …
Mobile evil twin malnets–the worst of both worlds
The mobile computing world is undergoing major changes both in the capability as well as
in the proliferation of mobile devices. While, up to now, mobile malware has played a …
in the proliferation of mobile devices. While, up to now, mobile malware has played a …
Coupled multi-agent simulations for mobile security & privacy research
The complexity of mobile device digital ecosystems is rapidly increasing. Not only the
absolute number of mobile devices, but also their diversity is on an ongoing rise. Devices …
absolute number of mobile devices, but also their diversity is on an ongoing rise. Devices …
A simulation framework to evaluate virtual cpu scheduling algorithms
Virtual CPU (VCPU) scheduling algorithms that efficiently manage processing-resource at
the machine virtualization layer are key to facilitate resource sharing and workload …
the machine virtualization layer are key to facilitate resource sharing and workload …
Security of critical information infrastructures exposed to mobile personal devices
A Mahboubi - 2018 - eprints.qut.edu.au
This thesis investigates both new intrusive and new unobtrusive methods which prevent
compromised mobile personal devices from infiltrating critical information infrastructures …
compromised mobile personal devices from infiltrating critical information infrastructures …
[PDF][PDF] Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht vertrauenswürdigen Netzwerken
C Szongott - 2015 - repo.uni-hannover.de
Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht vertrauenswürdigen
Netzwerken Page 1 Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht …
Netzwerken Page 1 Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht …