Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The impact of artificial intelligence on data system security: A literature review
R Raimundo, A Rosário - Sensors, 2021 - mdpi.com
Diverse forms of artificial intelligence (AI) are at the forefront of triggering digital security
innovations based on the threats that are arising in this post-COVID world. On the one hand …
innovations based on the threats that are arising in this post-COVID world. On the one hand …
[HTML][HTML] Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic map** review
ID Sánchez-García, TSF Gilabert… - Computers & Security, 2023 - Elsevier
Cybersecurity continues to be one of the principal issues in the computing environment.
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …
Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework
As financial institutions navigate an increasingly complex cyber threat landscape and
regulatory ecosystem, there is a pressing need for a robust and adaptive security …
regulatory ecosystem, there is a pressing need for a robust and adaptive security …
[HTML][HTML] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems
J Alanen, J Linnosmaa, T Malm… - Reliability Engineering & …, 2022 - Elsevier
This paper introduces a model-based methodology for hybrid reliability, availability,
maintainability, safety, and security (RAMSS) risk assessment management, which extends …
maintainability, safety, and security (RAMSS) risk assessment management, which extends …
An ontology-based security risk management model for information systems
Security risk management is a knowledge-intensive procedure that requires monitoring and
capturing relevant information that can assist in making the right decision by managers. In …
capturing relevant information that can assist in making the right decision by managers. In …
Security standard compliance and continuous verification for Industrial Internet of Things
Due to globalization and digitalization of industrial systems, standard compliance is gaining
more attention. In order to stay competitive and remain in business, different sectors within …
more attention. In order to stay competitive and remain in business, different sectors within …
[HTML][HTML] Ontologies in cloud computing—review and future directions
Cloud computing as a technology has the capacity to enhance cooperation, scalability,
accessibility, and offers discount prospects using improved and effective computing, and this …
accessibility, and offers discount prospects using improved and effective computing, and this …
A real-world information security performance assessment using a multidimensional socio-technical approach
Measuring the performance of information security is an essential part of the information
security management system within organisations. Studies in the past mainly focused on …
security management system within organisations. Studies in the past mainly focused on …
[HTML][HTML] Seconto: Ontological Representation of Security Directives
The current digital landscape demands robust security requirements and, for doing so, the
institutions enact complex security directives to protect the citizens and the infrastructures …
institutions enact complex security directives to protect the citizens and the infrastructures …
Security Analysis Of Simpel Desa Using Mobile Security Framework And Iso 27002: 2013
Abstract The Personal Identification Number or KTP is prone to be stolen and used by
unwanted parties, this is also a possibility for the Simpel Desa, a village administration …
unwanted parties, this is also a possibility for the Simpel Desa, a village administration …