Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reputation-based federated learning defense to mitigate threats in eeg signal classification
This paper presents a reputation-based threat mitigation framework that defends potential
security threats in electroencephalogram (EEG) signal classification during model …
security threats in electroencephalogram (EEG) signal classification during model …
Threat-specific security risk evaluation in the cloud
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …
security requirements of individual cloud computing clients in the security risk evaluation. In …
[HTML][HTML] Robust ML model ensembles via risk-driven anti-clustering of training data
In this paper, we improve the robustness of Machine Learning (ML) classifiers against
training-time attacks by linking the risk of training data being tampered with to the …
training-time attacks by linking the risk of training data being tampered with to the …
Toward big data risk analysis
E Damiani - 2015 IEEE International Conference on Big Data …, 2015 - ieeexplore.ieee.org
The advent of social networks and Internet-of-Things has resulted in unprecedented
capability of collecting, sharing and analyzing massive amounts of data. From a security …
capability of collecting, sharing and analyzing massive amounts of data. From a security …
Assessing the security risks of multicloud saas applications: A real-world case study
Cloud computing is widely believed to be the future of computing. It has grown from being a
promising idea to one of the fastest research and development paradigms of the computing …
promising idea to one of the fastest research and development paradigms of the computing …
Modeling time, probability, and configuration constraints for continuous cloud service certification
Cloud computing proposes a paradigm shift where resources and services are allocated,
provisioned, and accessed at runtime and on demand. New business opportunities emerge …
provisioned, and accessed at runtime and on demand. New business opportunities emerge …
Системное моделирование акторных взаимодействий для облачных сервисов
Основу данной монографии составляет материал, полученный в научно-
исследовательской лаборатории «Интеллектуальных информационных систем и …
исследовательской лаборатории «Интеллектуальных информационных систем и …
Return on investment-based suitability assessment model for cloud migration
Many IT-based organisations have shown an interest in moving their business operation into
a cloud-enabled system as they noticed that cloud-oriented gives better revenue and return …
a cloud-enabled system as they noticed that cloud-oriented gives better revenue and return …
Finding risk patterns in cloud system models
F Kunz, ZÁ Mann - 2019 IEEE 12th International Conference on …, 2019 - ieeexplore.ieee.org
The risk of unauthorized access to confidential data is a major problem in cloud computing.
In previous work, the notion of risk patterns was introduced to capture configurations of cloud …
In previous work, the notion of risk patterns was introduced to capture configurations of cloud …
Проактивный и реактивный риск-менеджмент IT-сервисов облачных сред
Постановка проблемы: большинство случаев возникновения внештатных ситуаций в
облачных средах является следствием неэффективного управления рисками …
облачных средах является следствием неэффективного управления рисками …