Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security by design for big data frameworks over cloud computing
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
An attribute-based access control for cloud enabled industrial smart vehicles
Smart cities' vision will encompass connected industrial vehicles, which will offer data-driven
and intelligent services to the user. Such interaction within dispersed connected objects are …
and intelligent services to the user. Such interaction within dispersed connected objects are …
Next-generation big data federation access control: A reference model
This paper discusses one of the most significant challenges of next-generation big data (BD)
federation platforms, namely, Hadoop access control. Privacy and security on a federation …
federation platforms, namely, Hadoop access control. Privacy and security on a federation …
Lightweight Access Delegation With Multi-Ciphertext Equivalence Test for Shared Data in ITS
J Wang, S Wang, Y Deng, D Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The content-centric data sharing in Intelligent Transportation Systems (ITS) becomes
increasingly imperative to improve road safety and traffic efficiency. In order to protect the …
increasingly imperative to improve road safety and traffic efficiency. In order to protect the …
Towards a learning-enabled virtual sensor forensic architecture compliant with edge intelligence
While the Internet of Things (IoT), Wireless Sensor Networks (WSNs), and the techniques for
extracting digital data have seen continuous advancements, so does the cyber-threat …
extracting digital data have seen continuous advancements, so does the cyber-threat …