Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
Influencing models and determinants in big data analytics research: A bibliometric analysis
Incorporating big data analytics into a particular context brings various challenges that rest
on the model or framework through which individuals or organisations adopt big data to …
on the model or framework through which individuals or organisations adopt big data to …
[BOEK][B] Game theory for cyber deception
Interactions both online and in the emerging Internet of things (IoT) feature distributed
agents with local decision-making capabilities and misaligned incentives. This has …
agents with local decision-making capabilities and misaligned incentives. This has …
Smart meters big data: Game theoretic model for fair data sharing in deregulated smart grids
Aggregating fine-granular data measurements from smart meters presents an opportunity for
utility companies to learn about consumers' power consumption patterns. Several research …
utility companies to learn about consumers' power consumption patterns. Several research …
Game theory based correlated privacy preserving analysis in big data
Privacy preservation is one of the greatest concerns in big data. As one of extensive
applications in big data, privacy preserving data publication (PPDP) has been an important …
applications in big data, privacy preserving data publication (PPDP) has been an important …
Valuating {Friends'} privacy: Does anonymity of sharing personal data matter?
Through their third-party app installation decisions, users are frequently triggering
interdependent privacy consequences by sharing personal information of their friends who …
interdependent privacy consequences by sharing personal information of their friends who …
Towards a model on the factors influencing social app users' valuation of interdependent privacy
In the context of third-party social apps, the problem of interdependency of privacy refers to
users making app adoption decisions which cause the collection and utilization of personal …
users making app adoption decisions which cause the collection and utilization of personal …
Multi-computer malware detection systems with metamorphic functionality
The need to develop new systems for detecting and counteracting malware remains
relevant. In addition to malware detection methods, the need to develop new systems for …
relevant. In addition to malware detection methods, the need to develop new systems for …
Social Media Profiling Continues to Partake in the Development of Formalistic Self-Concepts. Social Media Users Think So, Too.
Social media platforms generate user profiles to recommend informational resources
including targeted advertisements. The technical possibilities of user profiling methods go …
including targeted advertisements. The technical possibilities of user profiling methods go …
Prospect theoretic analysis of privacy-preserving mechanism
We study a problem of privacy-preserving mechanism design. A data collector wants to
obtain data from individuals to perform some computations. To relieve the privacy threat to …
obtain data from individuals to perform some computations. To relieve the privacy threat to …