Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Federated learning meets blockchain in edge computing: Opportunities and challenges
Mobile-edge computing (MEC) has been envisioned as a promising paradigm to handle the
massive volume of data generated from ubiquitous mobile devices for enabling intelligent …
massive volume of data generated from ubiquitous mobile devices for enabling intelligent …
[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …
have given humans access to interact virtually with objects. Until now, numerous virtual …
[HTML][HTML] Early detection of crypto-ransomware using pre-encryption detection algorithm
Crypto ransomware is a type of malware that locks its victim's file for ransom using an
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …
Cyber threats classifications and countermeasures in banking and financial sector
The banking and financial sector has always been a prime target for cyber threats due to the
critical nature of the information they handle. With the increasing dependence on technology …
critical nature of the information they handle. With the increasing dependence on technology …
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …
comprehensive services to users in different places. However, with the exponential growth of …
Analysis of security issues and countermeasures for the industrial internet of things
S Pal, Z Jadidi - Applied Sciences, 2021 - mdpi.com
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT)
services and applications to industry with the inclusion of Industry 4.0 that provides …
services and applications to industry with the inclusion of Industry 4.0 that provides …
Detection of fake accounts on social media using multimodal data with deep learning
In recent years, the proliferation of fake accounts on social media has become a significant
concern for individuals, organizations, and society. Fake accounts play an important role in …
concern for individuals, organizations, and society. Fake accounts play an important role in …
Dimensions of internet of things: Technological taxonomy architecture applications and open challenges—a systematic review
We are traversing the growing emerging technology paradigms in today's advanced
technological world. In this present era, the Internet of Things (IoT) is extensively used in all …
technological world. In this present era, the Internet of Things (IoT) is extensively used in all …
Analysis of the cryptographic algorithms in IoT communications
C Silva, VA Cunha, JP Barraca, RL Aguiar - Information Systems Frontiers, 2024 - Springer
The advances on recent communication paradigms brings new security and privacy
challenges, mainly about personal data collection by smart devices. Resource constrained …
challenges, mainly about personal data collection by smart devices. Resource constrained …