Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
A computation offloading method over big data for IoT-enabled cloud-edge computing
The Internet of mobile things is a burgeoning technique that generates, stores and
processes big real-time data to render rich services for mobile users. In order to mitigate …
processes big real-time data to render rich services for mobile users. In order to mitigate …
The rise of ransomware and emerging security challenges in the Internet of Things
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …
Federated internet of things and cloud computing pervasive patient health monitoring system
The exponentially growing healthcare costs coupled with the increasing interest of patients
in receiving care in the comfort of their own homes have prompted a serious need to …
in receiving care in the comfort of their own homes have prompted a serious need to …
Enhancing the performance of healthcare service in IoT and cloud using optimized techniques
P Kumar, K Silambarasan - IETE Journal of Research, 2022 - Taylor & Francis
Big data research for health service applications, from the approval of the cloud computing
and the Internet of Things (IoT) model of healthcare brought drastic changes in the medical …
and the Internet of Things (IoT) model of healthcare brought drastic changes in the medical …
Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid
IEC 61850 is one of the most prominent communication standards adopted by the smart grid
community due to its high scalability, multi-vendor interoperability, and support for several …
community due to its high scalability, multi-vendor interoperability, and support for several …
IoT enabled RFID authentication and secure object tracking system for smart logistics
Object tracking is a fundamental problem in Supply Chain Management (SCM). Recent
innovations eliminate the difficulties in traditional approach such as manual counting …
innovations eliminate the difficulties in traditional approach such as manual counting …
Physical-layer detection and security of printed chipless RFID tag for Internet of Things applications
This article has proposed detection and physical-layer security provision for printed sensory
tag systems for Internet of Things (IoT) applications. The printed sensory tags can be a very …
tag systems for Internet of Things (IoT) applications. The printed sensory tags can be a very …
An improved IoT/RFID-enabled object tracking and authentication scheme for smart logistics
Smart logistics play a crucial role for rapid industrialization and economic development of
the countries. It not only assists in delivering the low cost services to the subscribers but also …
the countries. It not only assists in delivering the low cost services to the subscribers but also …
A novel framework for a remote patient monitoring (RPM) system with abnormality detection
CR Su, J Hajiyev, CJ Fu, KC Kao, CH Chang… - Health Policy and …, 2019 - Elsevier
Objective This research aims to build an effective and automated RPM system based on an
information communication technology (ICT) framework that automatically triggers medical …
information communication technology (ICT) framework that automatically triggers medical …