Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
How blockchain technology can benefit marketing: Six pending research areas
The proliferation of sophisticated e-commerce platforms coupled with mobile applications
has ignited growth in business-to-consumer (B2C) commerce, reshaped organizational …
has ignited growth in business-to-consumer (B2C) commerce, reshaped organizational …
IoT health devices: exploring security risks in the connected landscape
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
Exploring sybil and double-spending risks in blockchain systems
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
[HTML][HTML] Smart organizations as a source of competitiveness and sustainable development in the age of industry 4.0: Integration of micro and macro perspective
The Industry 4.0 Revolution that is taking place nowadays means that organizations face not
only new opportunities, but also challenges related to the identification of their role in …
only new opportunities, but also challenges related to the identification of their role in …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
Threat analysis of software systems: A systematic literature review
Architectural threat analysis has become an important cornerstone for organizations
concerned with develo** secure software. Due to the large number of existing techniques …
concerned with develo** secure software. Due to the large number of existing techniques …
[HTML][HTML] Addressing insider attacks via forensic-ready risk management
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
An integrated conceptual model for information system security risk management supported by enterprise architecture management
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …
information system (IS) security. However, IS security risk management (ISSRM) remains a …
Cyber security risk modeling in distributed information systems
This paper deals with problems of the development and security of distributed information
systems. It explores the challenges of risk modeling in such systems and suggests a risk …
systems. It explores the challenges of risk modeling in such systems and suggests a risk …
Cybersecurity risk management framework for blockchain identity management systems in health IoT
Blockchain (BC) has recently paved the way for develo** Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …
Management (IdM) systems for different information systems. Researchers widely use it to …