Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …
Platform as a Service and Infrastructure as a Service. However, these service delivery …
Software-defined networks for resource allocation in cloud computing: A survey
Cloud computing has a shared set of resources, including physical servers, networks,
storage, and user applications. Resource allocation is a critical issue for cloud computing …
storage, and user applications. Resource allocation is a critical issue for cloud computing …
A survey on service migration in mobile edge computing
Mobile edge computing (MEC) provides a promising approach to significantly reduce
network operational cost and improve quality of service (QoS) of mobile users by pushing …
network operational cost and improve quality of service (QoS) of mobile users by pushing …
Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment
Cloud computing infrastructure is suitable for meeting computational needs of large task
sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be …
sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be …
Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art
The fundamental role of the software defined networks (SDNs) is to decouple the data plane
from the control plane, thus providing a logically centralized visibility of the entire network to …
from the control plane, thus providing a logically centralized visibility of the entire network to …
Authentication in mobile cloud computing: A survey
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …
that incorporates multitude of heterogeneous cloud-based resources to augment …
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
Mobile cloud computing is applied in multiple industries to obtain cloud‐based services by
leveraging mobile technologies. With the development of the wireless networks, defending …
leveraging mobile technologies. With the development of the wireless networks, defending …
Network forensics: Review, taxonomy, and open challenges
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …
investigate the increasing number of cybercrimes. Network forensics techniques assist in …
Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions
Mobile cloud computing (MCC) enables the development of computational intensive mobile
applications by leveraging the application processing services of computational clouds …
applications by leveraging the application processing services of computational clouds …
A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll …
M Chiregi, NJ Navimipour - Computers in Human Behavior, 2016 - Elsevier
Trust in the cloud environment is not written into an agreement and is something earned. In
any trust evaluation mechanism, opinion leaders are the entities influencing the behaviors or …
any trust evaluation mechanism, opinion leaders are the entities influencing the behaviors or …