Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of browser fingerprint research and application
D Zhang, J Zhang, Y Bu, B Chen… - … and Mobile Computing, 2022 - Wiley Online Library
With the development of modern browsing, the convenience brought by rich browser
features has also produced a large number of features, which are called browser …
features has also produced a large number of features, which are called browser …
Browser Fingerprinting: Overview and Open Challenges
M Hölbl, V Zadorozhny… - Information …, 2024 - ebooks.iospress.nl
The central concept of browser fingerprinting is the collection of device-specific information
for identification or security purposes. This chapter provides an overview of the research …
for identification or security purposes. This chapter provides an overview of the research …
Adaptive authentication system based on unsupervised learning for web-oriented platforms
AY Iskhakov, YY Khazanova, MV Mamchenko… - Mobile Computing and …, 2023 - Springer
This paper considers the problem of internal threats caused by the actions that are
performed by the employees who have legal access to the company's data or by the …
performed by the employees who have legal access to the company's data or by the …
Blockchain-Based Decentralized Federated Learning Model
H Wang, D Mao, Z Chen, H Rao… - 2023 4th International …, 2023 - ieeexplore.ieee.org
As a decentralized technology, blockchain has the characteristics of traceability and
immutability. Using blockchain technology, each model update of federation information can …
immutability. Using blockchain technology, each model update of federation information can …
Been Here Already? Detecting Synchronized Browsers in the Wild
Browsers have become the most popular and used platform for accessing the web. Their
wide and exclusive usage as a medium for doing several tasks in the Internet comes with …
wide and exclusive usage as a medium for doing several tasks in the Internet comes with …
Power data attribution revocation searchable encrypted cloud storage
J Li, T Zhang - 2023 3rd International Conference on Consumer …, 2023 - ieeexplore.ieee.org
Grid business data contains a large amount of electricity data customer privacy data, serving
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
Dynamic trust continuous evaluation-based zero-trust access control for power grid cloud service
P Lv, X Sun, H Huang, J Qian, C Sun… - Journal of Physics …, 2022 - iopscience.iop.org
The development of power grid cloud service puts forward higher requirements for remote
secure access. To realize fine-grained access control of remote secure access of power grid …
secure access. To realize fine-grained access control of remote secure access of power grid …
Sucurity Protection Framework for Power 5G Services Based on Zero-Trust Model
P Zhou, Y Guo, X Chen, L Chen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Energy Internet is one of the core components of the Industrial Internet, with trillions of
terminals connected to the network, linking all aspects of energy production, transmission …
terminals connected to the network, linking all aspects of energy production, transmission …
The taintdroid based honeypot monitoring system for embedded device
K Cheng, Z Wu, D Li, X Li, M Ren - Journal of Physics …, 2022 - iopscience.iop.org
Honeypot is a proactive defense technology introduced by defenders. Through the
honeypots, defenders can deceive attackers to illegally take advantage of the honeypots …
honeypots, defenders can deceive attackers to illegally take advantage of the honeypots …
Research and Application of APN Network Security Access Management Technology Based on Zero Trust Model for Power Grid IOT Terminal
Y Wang, A Jiang, X Zhu, M Yan… - 2024 6th International …, 2024 - ieeexplore.ieee.org
With the development of smart grid technology, the security of APN network of power grid
IOT terminal is facing greater challenges. If outsiders steal accounts or insiders engage in …
IOT terminal is facing greater challenges. If outsiders steal accounts or insiders engage in …