Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
IoT and artificial intelligence techniques for public safety and security
The Internet of Things (IoT) is transforming how organizations and industries communicate
and conduct their everyday operations. Its application has proven to be ideal for industries …
and conduct their everyday operations. Its application has proven to be ideal for industries …
Logical concept map** and social media analytics relating to cyber criminal activities for ontology creation
R Rawat - International Journal of Information Technology, 2023 - Springer
The backbone of the semantic web is ontology, dealing with the context of details associated
with a specific domain. Domain ontology (DO) is an important source of information for …
with a specific domain. Domain ontology (DO) is an important source of information for …
Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …
Mobile operating system (Android) vulnerability analysis using machine learning
Because of the computational processing, seamless functioning and benefits that it gives to
Android-users, cyber thieves have been drawn towards it. Conventional AMD: android …
Android-users, cyber thieves have been drawn towards it. Conventional AMD: android …
Organ trafficking on the dark web—The data security and privacy concern in healthcare systems
On the dark web (DW), criminal's are technologically knowledgeable so security agencies
must keep up to speed with all data sources in endeavors to find criminals and identify their …
must keep up to speed with all data sources in endeavors to find criminals and identify their …
Anonymous trading on the dark online marketplace: An exploratory study
Advancement in technology provides numerous solutions to not only legitimate businesses
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches
Real-time network inspection applications face a threat of vulnerability as high-speed
networks continue to expand. For companies and ISPs, real-time traffic classification is an …
networks continue to expand. For companies and ISPs, real-time traffic classification is an …
Facial emotion recognition based on textural pattern and convolutional neural network
Human emotional states can be detected by various ways such as analysingthe brain
signals (EEG), speech, skin responses, facial expressions, body gestures etc. But facial …
signals (EEG), speech, skin responses, facial expressions, body gestures etc. But facial …
Integrating AI with cyber security for smart industry 4.0 application
The advent of Smart Industry 4.0 has brought about significant advances in automation,
efficiency, and productivity in industrial environments. However, these technological …
efficiency, and productivity in industrial environments. However, these technological …