Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI
In this short editorial we present some thoughts on present and future trends in Artificial
Intelligence (AI) generally, and Machine Learning (ML) specifically. Due to the huge ongoing …
Intelligence (AI) generally, and Machine Learning (ML) specifically. Due to the huge ongoing …
Digital forensics subdomains: the state of the art and future directions
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …
scientifically proven digital forensic investigation techniques to corroborate a suspected …
Why your encrypted database is not secure
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …
management systems (DBMS's), use abstract threat models that capture neither realistic …
Security and privacy implications on database systems in big data era: A survey
GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …
model for data storage and management. However, as the Big Data explosion has …
Database forensic investigation process models: A review
Database Forensic Investigation (DBFI) involves the identification, collection, preservation,
reconstruction, analysis, and reporting of database incidents. However, it is a …
reconstruction, analysis, and reporting of database incidents. However, it is a …
CDBFIP: Common database forensic investigation processes for Internet of Things
Database forensics is a domain that uses database content and metadata to reveal
malicious activities on database systems in an Internet of Things environment. Although the …
malicious activities on database systems in an Internet of Things environment. Although the …
Development and validation of a database forensic metamodel (DBFM)
Database Forensics (DBF) is a widespread area of knowledge. It has many complex
features and is well known amongst database investigators and practitioners. Several …
features and is well known amongst database investigators and practitioners. Several …
[HTML][HTML] A unified forensic model applicable to the database forensics field
The Database Forensics Investigation (DBFI) field is focused on capturing and investigating
database incidents. DBFI is a subdomain of the digital forensics domain, which deals with …
database incidents. DBFI is a subdomain of the digital forensics domain, which deals with …
Exploring change: A new dimension of data analytics
T Bleifuß, L Bornemann, T Johnson… - Proceedings of the …, 2018 - dl.acm.org
Data and metadata in datasets experience many different kinds of change. Values are
inserted, deleted or updated; rows appear and disappear; columns are added or …
inserted, deleted or updated; rows appear and disappear; columns are added or …
Behavior-based anomaly detection in log data of physical access control systems
Behavior-based anomaly detection (AD) approaches for enterprise-IT security are not easily
applicable to other domains, such as embedded devices and IoT nodes in cyber-physical …
applicable to other domains, such as embedded devices and IoT nodes in cyber-physical …