Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Social media analytics on Russia–Ukraine cyber war with natural language processing: Perspectives and challenges
F Sufi - Information, 2023 - mdpi.com
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …
Role of artificial intelligence in the prevention of online child sexual abuse: A systematic review of literature
S Singh, V Nambiar - Journal of Applied Security Research, 2024 - Taylor & Francis
Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year,
more than a billion children between the ages of 2–17 years are sexually abused. Despite …
more than a billion children between the ages of 2–17 years are sexually abused. Despite …
A new social media-driven cyber threat intelligence
F Sufi - Electronics, 2023 - mdpi.com
Cyber threats are projected to cause USD 10.5 trillion in damage to the global economy in
2025. Comprehending the level of threat is core to adjusting cyber posture at the personal …
2025. Comprehending the level of threat is core to adjusting cyber posture at the personal …
An NLP‐Based Framework to Spot Extremist Networks in Social Media
Governments and law enforcement agencies (LEAs) are increasingly concerned about
growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism …
growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism …
Integrated content-network analysis to discover influential collectives for studying social cyber-threats from online social movements
F Amro, H Purohit - Social Network Analysis and Mining, 2023 - Springer
Recent online social movements with offline violence events have been linked to activities of
threat actors that exploit online social networks to instigate violence, among other ills. In …
threat actors that exploit online social networks to instigate violence, among other ills. In …
[HTML][HTML] Cavectir: Matching cyber threat intelligence reports on connected and autonomous vehicles using machine learning
Connected and automated vehicles (CAVs) are getting a lot of attention these days as their
technology becomes more mature and they benefit from the Internet-of-Vehicles (IoV) …
technology becomes more mature and they benefit from the Internet-of-Vehicles (IoV) …
Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence
M Bedoya, S Palacios, D Diaz-López… - Proceedings of the 18th …, 2023 - dl.acm.org
Recently, system security represents a big challenge for many organizations, and it must be
specifically handled when a system is intended to be deployed in a cloud environment …
specifically handled when a system is intended to be deployed in a cloud environment …
Preserving users' sensitive data in physical and virtual world using machine learning: a strategy
The impact of computing on society is intricate and far-reaching both physically and virtually.
Computers have led to an increase in productivity since they have made a wide variety of …
Computers have led to an increase in productivity since they have made a wide variety of …
Detecting hate crimes through machine learning and natural language processing
A Ortiz Salazar - Police Practice and Research, 2024 - Taylor & Francis
Misidentification and misreporting of hate crimes by victims and law enforcement are
significant barriers to accurate data collection of hate crimes, and their consequent study …
significant barriers to accurate data collection of hate crimes, and their consequent study …
Data and AI in social systems: trust perspectives in a digitally develo** world
OK Giannaki - 2023 - dione.lib.unipi.gr
In an increasingly digitally develo** world–a world where most aspects of modern life are
directly or indirectly related to digital technology–the relationship between data, privacy, and …
directly or indirectly related to digital technology–the relationship between data, privacy, and …