Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
IT assets, IT infrastructure performance and IT capability: a framework for e-government
D Dahiya, SK Mathew - Transforming Government: People, Process …, 2016 - emerald.com
Purpose Although government investments in IT is growing, it is unclear how and what kind
of IT investments lead to desirable E-Government performance. Several studies pertaining to …
of IT investments lead to desirable E-Government performance. Several studies pertaining to …
[PDF][PDF] An investigation on detection of vulnerabilities in Internet of Things
A Raghuvanshi, UK Singh, C Bulla… - European Journal of …, 2020 - academia.edu
IoT is a woven mixture of traditional systems, sensors, clouds, mobile applications, Web
applications and control systems, affecting every aspect of people's lives. Security concerns …
applications and control systems, affecting every aspect of people's lives. Security concerns …
An algorithm for computing Voronoi diagrams of general generators in general normed spaces
D Reem - 2009 Sixth International Symposium on Voronoi …, 2009 - ieeexplore.ieee.org
Voronoi diagrams appear in many areas in science and technology and have diverse
applications. Roughly speaking, they are a certain decomposition of a given space into cells …
applications. Roughly speaking, they are a certain decomposition of a given space into cells …
A survey and classification of XML based attacks on web applications
ABSTRACT XML based attacks are executed in web applications through crafted XML
document that forces XML parser to process un-validated documents. This leads to …
document that forces XML parser to process un-validated documents. This leads to …
Web services security and threats: A systematic literature review
EA Setyawan, F Hidayat - … Conference on ICT for Smart Society …, 2020 - ieeexplore.ieee.org
Privacy and data protection issues are the main problems in using web services to transmit
data. Three aspects of information security that contains confidentiality, integrity, and …
data. Three aspects of information security that contains confidentiality, integrity, and …
Environmental sound classification based on time-frequency representation
KZ Thwe, N War - … 18th IEEE/ACIS International Conference on …, 2017 - ieeexplore.ieee.org
This paper proposes a feature extraction method for environmental sound event
classification based on time-frequency representation such as spectrogram. There are three …
classification based on time-frequency representation such as spectrogram. There are three …
Making xml signatures immune to xml signature wrap** attacks
The increased usage of XML in distributed systems and platforms increases the demand for
robust and effective security mechanisms likewise. Recent research work discovered …
robust and effective security mechanisms likewise. Recent research work discovered …
Vulnerability of cloud: Analysis of XML signature wrap** attack and countermeasures
Abstract Simple Object Access Protocol (SOAP) uses text-supported eXtensible Markup
Language (XML) messaging configuration to interchange web encrypted information over a …
Language (XML) messaging configuration to interchange web encrypted information over a …
[PDF][PDF] XSpRES-Robust and Effective XML Signatures for Web Services.
XML Encryption and XML Signature are fundamental security standards forming the core for
many applications which require to process XML-based data. Due to the increased usage of …
many applications which require to process XML-based data. Due to the increased usage of …
Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
R Bhardwaj, S Gogula, B Bhabani… - Natural Language …, 2025 - Wiley Online Library
Summary The Internet of Things (IoT) refers to the increasing connectivity of many human‐
made entities, such as healthcare systems, smart homes, and smart grids, through the …
made entities, such as healthcare systems, smart homes, and smart grids, through the …