Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital forensic research: current state of the art
S Raghavan - Csi Transactions on ICT, 2013 - Springer
Digital forensics is the process of employing scientific principles and processes to analyze
electronically stored information and determine the sequence of events which led to a …
electronically stored information and determine the sequence of events which led to a …
The ubiquitous digital file: A review of file management research
Computer users spend time every day interacting with digital files and folders, including
downloading, moving, naming, navigating to, searching for, sharing, and deleting them …
downloading, moving, naming, navigating to, searching for, sharing, and deleting them …
Cryptolock (and drop it): stop** ransomware attacks on user data
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …
A study of practical deduplication
DT Meyer, WJ Bolosky - ACM Transactions on Storage (ToS), 2012 - dl.acm.org
We collected file system content data from 857 desktop computers at Microsoft over a span
of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication …
of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication …
Aerie: Flexible file-system interfaces to storage-class memory
Storage-class memory technologies such as phase-change memory and memristors present
a radically different interface to storage than existing block devices. As a result, they provide …
a radically different interface to storage than existing block devices. As a result, they provide …
Secure data deduplication
MW Storer, K Greenan, DDE Long… - Proceedings of the 4th …, 2008 - dl.acm.org
As the world moves to digital storage for archival purposes, there is an increasing demand
for systems that can provide secure data storage in a cost-effective manner. By identifying …
for systems that can provide secure data storage in a cost-effective manner. By identifying …
[PDF][PDF] Characteristics of backup workloads in production systems.
2009 EMC Template Sample 24 Point Arial Regular Page 1 © Copyright 2012 EMC
Corporation. All rights reserved. CHARACTERISTICS OF BACKUP WORKLOADS IN …
Corporation. All rights reserved. CHARACTERISTICS OF BACKUP WORKLOADS IN …
Preventing history forgery with secure provenance
As increasing amounts of valuable information are produced and persist digitally, the ability
to determine the origin of data becomes important. In science, medicine, commerce, and …
to determine the origin of data becomes important. In science, medicine, commerce, and …
Fuzzing file systems via two-dimensional input space exploration
File systems, a basic building block of an OS, are too big and too complex to be bug free.
Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find …
Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find …
Boosting efficiency and security in proof of ownership for deduplication
Deduplication is a technique used to reduce the amount of storage needed by service
providers. It is based on the intuition that several users may want (for different reasons) to …
providers. It is based on the intuition that several users may want (for different reasons) to …