Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …
access to information is done by previously dumb phones. For example, the number of …
Fbsleuth: Fake base station forensics via radio frequency fingerprinting
Fake base station (FBS) crime is a type of wireless communication crime that has appeared
recently. The key to enforcing the laws on regulating FBS based crime is not only to arrest …
recently. The key to enforcing the laws on regulating FBS based crime is not only to arrest …
[HTML][HTML] Threat modeling framework for mobile communication systems
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …
networks. We survey known attacks against mobile communication and organize them into …
Predicting fault prone modules by the dempster-shafer belief networks
This paper describes a novel methodology for predicting fault prone modules. The
methodology is based on Dempster-Shafer (DS) belief networks. Our approach consists of …
methodology is based on Dempster-Shafer (DS) belief networks. Our approach consists of …
Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure
This paper presents an evaluation of the security quality requirements engineering
(SQUARE) method. The evaluation of SQUARE was conducted by its application on the …
(SQUARE) method. The evaluation of SQUARE was conducted by its application on the …
[Књига][B] Security in Wireless Communication Networks
Receive comprehensive instruction on the fundamentals of wireless security from three
leading international voices in the field Security in Wireless Communication …
leading international voices in the field Security in Wireless Communication …
Cyber attacks in cyber-physical power systems: A case study with GPRS-based SCADA systems
T Zhang, Y Wang, X Liang, Z Zhuang… - 2017 29th Chinese …, 2017 - ieeexplore.ieee.org
With the integration of computing, communication, and physical processes, the modern
power grid is becoming a large and complex cyber physical power system (CPPS). This …
power grid is becoming a large and complex cyber physical power system (CPPS). This …
Rogue base stations detection for advanced metering infrastructure based on signal strength clustering
Q Bin, C Ziwen, X Yong, H Liang, S Sheng - Ieee Access, 2019 - ieeexplore.ieee.org
The smart meters and meter collectors in Advanced Metering Infrastructure (AMI), which are
installed in every home, rely on wireless Virtual Private Network (VPN) for communicating …
installed in every home, rely on wireless Virtual Private Network (VPN) for communicating …
A qualitative risk analysis for the GPRS technology
C Xenakis, D Apostolopoulou, A Panou… - 2008 IEEE/IFIP …, 2008 - ieeexplore.ieee.org
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS)
technology. GPRS presents several essential security weaknesses which may lead to …
technology. GPRS presents several essential security weaknesses which may lead to …