Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …
organizations' information and communication technology strategy and investment …
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …
progressive development of the Internet of Things (IoT) has motivated medical and health …
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
Memristor-based hyperchaotic maps and application in auxiliary classifier generative adversarial nets
With the nonlinearity and plasticity, memristors are widely used as nonlinear devices for
chaotic oscillations or as biological synapses for neuromorphic computations. But discrete …
chaotic oscillations or as biological synapses for neuromorphic computations. But discrete …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …