Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Runtime verification for decentralised and distributed systems
This chapter surveys runtime verification research related to distributed systems. We report
solutions that study how to monitor system with some distributed characteristic, solutions that …
solutions that study how to monitor system with some distributed characteristic, solutions that …
Monitoring metric first-order temporal properties
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …
comparing system events against a specification formalizing which event sequences are …
A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
Hi-fi: collecting high-fidelity whole-system provenance
Data provenance---a record of the origin and evolution of data in a system---is a useful tool
for forensic analysis. However, existing provenance collection mechanisms fail to achieve …
for forensic analysis. However, existing provenance collection mechanisms fail to achieve …
Bootstrap** privacy compliance in big data systems
With the rapid increase in cloud services collecting and using user data to offer personalized
experiences, ensuring that these services comply with their privacy policies has become a …
experiences, ensuring that these services comply with their privacy policies has become a …
Proxy non-discrimination in data-driven systems
Machine learnt systems inherit biases against protected classes, historically disparaged
groups, from training data. Usually, these biases are not explicit, they rely on subtle …
groups, from training data. Usually, these biases are not explicit, they rely on subtle …
A case study on runtime monitoring of an autonomous research vehicle (ARV) system
Runtime monitoring is a versatile technique for detecting property violations in safety-critical
(SC) systems. Although instrumentation of the system under monitoring is a common …
(SC) systems. Although instrumentation of the system under monitoring is a common …
[HTML][HTML] Adopting security maturity model to the organizations' capability model
Each organization faces threats and risks in daily operations. One of the main risks is how to
assess the security level to protect from the increasing risks associated with technology …
assess the security level to protect from the increasing risks associated with technology …
Semantic-based logic representation and reasoning for automated regulatory compliance checking
J Zhang, NM El-Gohary - Journal of Computing in Civil Engineering, 2017 - ascelibrary.org
Existing automated compliance checking (ACC) efforts are limited in their automation and
reasoning capabilities; the state of the art in ACC still uses ad hoc reasoning …
reasoning capabilities; the state of the art in ACC still uses ad hoc reasoning …