Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
User intention-based traffic dependence analysis for anomaly detection
This paper describes an approach to enforce dependencies between network traffic and
user activities for anomaly detection. We present a framework and algorithms that analyze …
user activities for anomaly detection. We present a framework and algorithms that analyze …
Enhancing data trustworthiness via assured digital signing
Digital signatures are an important mechanism for ensuring data trustworthiness via source
authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee …
authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee …
Droidbarrier: Know what is executing on your android
Many Android vulnerabilities share a root cause of malicious unauthorized applications
executing without user's consent. In this paper, we propose the use of a technique called …
executing without user's consent. In this paper, we propose the use of a technique called …
Process authentication for high system assurance
This paper points out the need in modern operating system kernels for a process
authentication mechanism, where a process of a user-level application proves its identity to …
authentication mechanism, where a process of a user-level application proves its identity to …
Spam Trap** System: Novel security framework to fight against spam botnets
In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in
system, to tackle the issue of spam botnet detection. We add a new line of defense to the …
system, to tackle the issue of spam botnet detection. We add a new line of defense to the …
[PDF][PDF] Kernel based process level authentication framework for secure computing and high-level system assurance
ABSTRACTIn modern operating system kernels level security is not present and a well-
known approach to protecting systems from malicious activity is through the deployment of …
known approach to protecting systems from malicious activity is through the deployment of …
High assurance models for secure systems
HMJ Almohri - 2013 - search.proquest.com
Despite the recent advances in systems and network security, attacks on large enterprise
networks consistently impose serious challenges to maintaining data privacy and software …
networks consistently impose serious challenges to maintaining data privacy and software …
[PDF][PDF] Upgraded Kernel Based Process Validation for High System Assurance
VD Sonawane, A Mishra, C Vishal, J Vinay - 2016 - academia.edu
The current working framework doesn't have bits level security and they are shielded from
malevolent action through either by utilizing Mandatory Access Control (MAC) or Firewall …
malevolent action through either by utilizing Mandatory Access Control (MAC) or Firewall …
[PDF][PDF] Enhancing Data Trustworthiness via Assured Digital Signing
T Weiqi Dai, H **, S Xu - researchgate.net
Digital signatures are an important mechanism for ensuring data trustworthiness via source
authenticity, integrity, and source non-repudiation. However, their trustworthiness guarantee …
authenticity, integrity, and source non-repudiation. However, their trustworthiness guarantee …
AGENT BASED PUBLIC AUDIT FOR SECURED CLOUD STORAGE
VK Pal, R Roy, G Michael - Compusoft, 2015 - search.proquest.com
Operating system kernels typically enforce lowest restrictions on the applications
permissible to execute leading to the power of malicious programs to abuse system …
permissible to execute leading to the power of malicious programs to abuse system …