Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reputation-based federated learning defense to mitigate threats in eeg signal classification
Z Zhang, P Li, AY Al Hammadi, F Guo… - … on Computer and …, 2024 - ieeexplore.ieee.org
This paper presents a reputation-based threat mitigation framework that defends potential
security threats in electroencephalogram (EEG) signal classification during model …
security threats in electroencephalogram (EEG) signal classification during model …
Threat-specific security risk evaluation in the cloud
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …
security requirements of individual cloud computing clients in the security risk evaluation. In …
[HTML][HTML] Robust ML model ensembles via risk-driven anti-clustering of training data
In this paper, we improve the robustness of Machine Learning (ML) classifiers against
training-time attacks by linking the risk of training data being tampered with to the …
training-time attacks by linking the risk of training data being tampered with to the …
Toward big data risk analysis
E Damiani - 2015 IEEE International Conference on Big Data …, 2015 - ieeexplore.ieee.org
The advent of social networks and Internet-of-Things has resulted in unprecedented
capability of collecting, sharing and analyzing massive amounts of data. From a security …
capability of collecting, sharing and analyzing massive amounts of data. From a security …
Assessing the security risks of multicloud saas applications: A real-world case study
Cloud computing is widely believed to be the future of computing. It has grown from being a
promising idea to one of the fastest research and development paradigms of the computing …
promising idea to one of the fastest research and development paradigms of the computing …
Modeling time, probability, and configuration constraints for continuous cloud service certification
Cloud computing proposes a paradigm shift where resources and services are allocated,
provisioned, and accessed at runtime and on demand. New business opportunities emerge …
provisioned, and accessed at runtime and on demand. New business opportunities emerge …
Return on investment-based suitability assessment model for cloud migration
Many IT-based organisations have shown an interest in moving their business operation into
a cloud-enabled system as they noticed that cloud-oriented gives better revenue and return …
a cloud-enabled system as they noticed that cloud-oriented gives better revenue and return …
Finding risk patterns in cloud system models
F Kunz, ZÁ Mann - 2019 IEEE 12th International Conference on …, 2019 - ieeexplore.ieee.org
The risk of unauthorized access to confidential data is a major problem in cloud computing.
In previous work, the notion of risk patterns was introduced to capture configurations of cloud …
In previous work, the notion of risk patterns was introduced to capture configurations of cloud …
Towards transparent and trustworthy cloud
Despite its immense benefits in terms of flexibility, resource consumption, and simplified
management, cloud computing raises several concerns due to lack of trust and …
management, cloud computing raises several concerns due to lack of trust and …
Spiral^ SRA: a threat-specific security risk assessment framework for the cloud
Conventional security risk assessment approaches for cloud infrastructures do not explicitly
consider risk with respect to specific threats. This is a challenge for a cloud provider because …
consider risk with respect to specific threats. This is a challenge for a cloud provider because …