Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Internet of Things (IoT) cybersecurity research: A review of current research topics
Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …
comprising of people, smart devices, intelligent objects, data, and information. The …
Internet of things: Vision, applications and research challenges
D Miorandi, S Sicari, F De Pellegrini, I Chlamtac - Ad hoc networks, 2012 - Elsevier
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects
related to the extension of the Internet and the Web into the physical realm, by means of the …
related to the extension of the Internet and the Web into the physical realm, by means of the …
The wave kernel signature: A quantum mechanical approach to shape analysis
M Aubry, U Schlickewei… - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
We introduce the Wave Kernel Signature (WKS) for characterizing points on non-rigid three-
dimensional shapes. The WKS represents the average probability of measuring a quantum …
dimensional shapes. The WKS represents the average probability of measuring a quantum …
A reference model of information assurance & security
Y Cherdantseva, J Hilton - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Information Assurance & Security (IAS) is a dynamic domain which changes continuously in
response to the evolution of society, business needs and technology. This paper proposes a …
response to the evolution of society, business needs and technology. This paper proposes a …
[کتاب][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
Security requirements engineering: A framework for representation and analysis
C Haley, R Laney, J Moffett… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a framework for security requirements elicitation and analysis. The
framework is based on constructing a context for the system, representing security …
framework is based on constructing a context for the system, representing security …
Secure tropos: a security-oriented extension of the tropos methodology
H Mouratidis, P Giorgini - International Journal of Software …, 2007 - World Scientific
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …
careful analysis of software development processes shows that the definition of security …
Addressing privacy requirements in system design: the PriS method
C Kalloniatis, E Kavakli, S Gritzalis - Requirements Engineering, 2008 - Springer
A major challenge in the field of software engineering is to make users trust the software that
they use in their every day activities for professional or recreational reasons. Trusting …
they use in their every day activities for professional or recreational reasons. Trusting …
A BPMN extension for the modeling of security requirements in business processes
A Rodríguez, E Fernández-Medina… - IEICE transactions on …, 2007 - search.ieice.org
Business Processes are considered a crucial issue by many enterprises because they are
the key to maintain competitiveness. Moreover, business processes are important for …
the key to maintain competitiveness. Moreover, business processes are important for …
Cloud security engineering: Early stages of SDLC
SA Aljawarneh, A Alawneh, R Jaradat - Future Generation Computer …, 2017 - Elsevier
Security vulnerabilities and defects are results of poorly constructed software that can lead to
easy exploitation by the cyber criminals. A large number of Cloud software systems are …
easy exploitation by the cyber criminals. A large number of Cloud software systems are …