Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable
effort has been put toward enabling home automation. However, these technologies have …
effort has been put toward enabling home automation. However, these technologies have …
The psychology of security for the home computer user
The home computer user is often said to be the weakest link in computer security. They do
not always follow security advice, and they take actions, as in phishing, that compromise …
not always follow security advice, and they take actions, as in phishing, that compromise …
User perceptions of smart home IoT privacy
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …
households including Internet-connected devices that continuously monitor user activities. In …
End user security and privacy concerns with smart homes
The Internet of Things is becoming increasingly widespread in home environments.
Consumers are transforming their homes into smart homes, with internet-connected sensors …
Consumers are transforming their homes into smart homes, with internet-connected sensors …
“a stalker's paradise” how intimate partner abusers exploit technology
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …
Who's in control? Interactions in multi-user smart homes
Adoption of commercial smart home devices is rapidly increasing, allowing in-situ research
in people's homes. As these technologies are deployed in shared spaces, we seek to …
in people's homes. As these technologies are deployed in shared spaces, we seek to …
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …
multiple users with complex social relationships interact with a single device. Currently …
Access control in Internet-of-Things: A survey
Abstract The Internet of Things (IoT) is an emerging technology that is revolutionizing the
global economy and society. IoT enables a collaborative environment where different …
global economy and society. IoT enables a collaborative environment where different …
Stories from survivors: Privacy & security practices when co** with intimate partner abuse
We present a qualitative study of the digital privacy and security motivations, practices, and
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …
[HTML][HTML] A capability-based security approach to manage access control in the internet of things
Resource and information protection plays a relevant role in distributed systems like the
ones present in the Internet of Things (IoT). Authorization frameworks like RBAC and ABAC …
ones present in the Internet of Things (IoT). Authorization frameworks like RBAC and ABAC …