Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Federated distillation and blockchain empowered secure knowledge sharing for internet of medical things
With the development of Internet of Things (IoT) and Artificial Intelligence (AI) technologies,
smart services have penetrated into every aspect of our daily lives, including the medical …
smart services have penetrated into every aspect of our daily lives, including the medical …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …
Things”(IoT), it is essential to break down application and technology-based silos and …
InFeMo: Flexible big data management through a federated cloud system
CL Stergiou, KE Psannis, BB Gupta - ACM Transactions on Internet …, 2021 - dl.acm.org
This paper introduces and describes a novel architecture scenario based on Cloud
Computing and counts on the innovative model of Federated Learning. The proposed model …
Computing and counts on the innovative model of Federated Learning. The proposed model …
[HTML][HTML] A model to develop chatbots for assisting the teaching and learning process
Recently, in the commercial and entertainment sectors, we have seen increasing interest in
incorporating chatbots into websites and apps, in order to assist customers and clients. In …
incorporating chatbots into websites and apps, in order to assist customers and clients. In …
Practical whole-system provenance capture
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …
and the transformations that have been applied to them. Data provenance has many uses …
Towards scalable cluster auditing through grammatical inference over provenance graphs
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …
R-caid: Embedding root cause analysis within provenance-based intrusion detection
In modern enterprise security, endpoint detection products fire an alert when process activity
matches known attack behavior patterns. Human analysts then perform Root Cause …
matches known attack behavior patterns. Human analysts then perform Root Cause …