Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A tutorial on privacy, rcm and its implications in wlan
The proliferation of Wi-Fi devices has led to the rise of privacy concerns related to MAC
Address-based systems used for people tracking and localization across various …
Address-based systems used for people tracking and localization across various …
Physical layer security for 6G: Toward achieving intelligent native security at layer-1
I Ara, B Kelley - IEEE Access, 2024 - ieeexplore.ieee.org
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G
communication operation mode. 6G mobile network will enable intelligent applications …
communication operation mode. 6G mobile network will enable intelligent applications …
[HTML][HTML] Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case
ÁJ Varela-Vaca, RM Gasca, D Iglesias… - Internet of Things, 2024 - Elsevier
Collaboration of business processes is essential for business-to-business (B2B) processes.
Collaboration is interesting and important in connecting the digital context with the physical …
Collaboration is interesting and important in connecting the digital context with the physical …
A metamodeling approach for structuring and organizing cloud forensics domain
R Al-Mugerrn, A Al-Dhaqm… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
Metamodeling is a technique that can be utilized in general to integrate and define models
from various cloud computing research areas. Metamodeling method is applicable in a wide …
from various cloud computing research areas. Metamodeling method is applicable in a wide …
Artificial intelligence cyber security strategy
X Feng, Y Feng, ES Dawam - … , Intl Conf on Cloud and Big Data …, 2020 - ieeexplore.ieee.org
Nowadays, STEM (science, technology, engineering and mathematics) have never been
treated so seriously before. Artificial Intelligence (AI) has played an important role currently …
treated so seriously before. Artificial Intelligence (AI) has played an important role currently …
Revenue forecasting in smart retail based on customer clustering analysis
Understanding your customers is among one of the most important strategies to boost retail
profit. In this research, we propose a WiFi-based sensing method to analyze customer …
profit. In this research, we propose a WiFi-based sensing method to analyze customer …
Cross hashing: Anonymizing encounters in decentralised contact tracing protocols
During the COVID-19 (SARS-CoV-2) epidemic, Contact Tracing emerged as an essential
tool for managing the epidemic. App-based solutions have emerged for Contact Tracing …
tool for managing the epidemic. App-based solutions have emerged for Contact Tracing …
Cybersecurity using artificial intelligence
Abstract STEM (science, technology, engineering, and mathematics) are now taken
extremely seriously. Currently, artificial intelligence (AI) has a significant impact on STEM …
extremely seriously. Currently, artificial intelligence (AI) has a significant impact on STEM …
Is that traffic light tracking you? A case study on a municipal surveillance technology in Seattle
C Spiess - IEEE Transactions on Technology and Society, 2021 - ieeexplore.ieee.org
WiFi/Bluetooth MAC address collection can be used for the purpose of real-time travel
calculations for traffic engineering. Seattle is one such city to have deployed this technology …
calculations for traffic engineering. Seattle is one such city to have deployed this technology …
MAC address anonymization for crowd counting
Research has shown that counting WiFi packets called probe requests (PRs) implicitly
provides a proxy for the number of people in an area. In this paper, we discuss a crowd …
provides a proxy for the number of people in an area. In this paper, we discuss a crowd …