Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
The emergence of smart cities and sustainable development has become a globally
accepted form of urbanization. The epitome of smart city development has become possible …
accepted form of urbanization. The epitome of smart city development has become possible …
A conceptual model for cybersecurity governance
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …
Systematic review analysis on SQLIA detection and prevention approaches
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web
database driving applications. Attackers use SQLIA to get unauthorized access and perform …
database driving applications. Attackers use SQLIA to get unauthorized access and perform …
Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving
data confidentiality securely. Many SE solutions have been designed to improve efficiency …
data confidentiality securely. Many SE solutions have been designed to improve efficiency …
A natural human language framework for digital forensic readiness in the public cloud
Currently, about half of all global enterprises are adopting and using some form of cloud
computing services. In cloud computing, potential digital evidence is distributed across …
computing services. In cloud computing, potential digital evidence is distributed across …
Threshold multi-keyword search for cloud-based group data sharing
Searchable Encryption (SE) is a popular cryptographic primitive for building ciphertexts
retrieval systems with far-reaching applications. However, existing SE schemes generally do …
retrieval systems with far-reaching applications. However, existing SE schemes generally do …
An extended digital forensic readiness and maturity model
A Taiwo, I Claims - Forensic Science International: Digital Investigation, 2022 - Elsevier
Digital forensics readiness (DFR) is an important part of the growing forensic domain.
Research on DFR has been given little attention, while available DFR models have focused …
Research on DFR has been given little attention, while available DFR models have focused …
A defined digital forensic criteria for cybercrime reporting
In recent years a large proportion of cybercrime attacks are text-data based, whereby the
cyberattack propagation method is non-technical. Though copious information about these …
cyberattack propagation method is non-technical. Though copious information about these …
VR-PEKS: A verifiable and resistant to keyword guess attack public key encryption with keyword search scheme
Public key encryption with keyword search (PEKS) allows users to perform keyword
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …
Human Factors in Cybersecurity: A Cross-Cultural Study on Trust
IY Alhasan - 2023 - hammer.purdue.edu
Human error is one of the most prominent challenges facing cybersecurity today. Attackers
manipulate people's natural inclination to make mistakes using social engineering tactics to …
manipulate people's natural inclination to make mistakes using social engineering tactics to …