Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Cloud forensics issues and opportunities
Cloud computing technology is a rapidly growing field of study, which relies on sharing
computing resources rather than having local servers or personal devices to handle …
computing resources rather than having local servers or personal devices to handle …
[Retracted] Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications
S Raghavendra, P Srividya, M Mohseni… - Security and …, 2022 - Wiley Online Library
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost.
The Internet has numerous benefits, but model security remains a concern, which affects …
The Internet has numerous benefits, but model security remains a concern, which affects …
Explainable machine learning for default privacy setting prediction
When requesting a web-based service, users often fail in setting the website's privacy
settings according to their self privacy preferences. Being overwhelmed by the choice of …
settings according to their self privacy preferences. Being overwhelmed by the choice of …
CPPL: compact privacy policy language
Recent technology shifts such as cloud computing, the Internet of Things, and big data lead
to a significant transfer of sensitive data out of trusted edge networks. To counter resulting …
to a significant transfer of sensitive data out of trusted edge networks. To counter resulting …
PPM: Privacy policy manager for personalized services
S Kiyomoto, T Nakamura, H Takasaki… - … , Reliability, and Security, 2013 - Springer
In this paper, we introduce a new architecture for personalized services. The architecture
separates access control using a user own privacy policy from data storage for private …
separates access control using a user own privacy policy from data storage for private …
Adaptive traffic fingerprinting for darknet threat intelligence
Darknet technology such as Tor has been used by various threat actors for organising illegal
activities and data exfiltration. As such there is a case for organisations to block such traffic …
activities and data exfiltration. As such there is a case for organisations to block such traffic …
Easing the burden of setting privacy preferences: A machine learning approach
Abstract Setting appropriate privacy preferences is both a difficult and cumbersome task for
users. In this paper, we propose a solution to address users' privacy concerns by easing the …
users. In this paper, we propose a solution to address users' privacy concerns by easing the …
[PDF][PDF] PPM: Privacy Policy Manager for Home Energy Management System.
The smart grid has been a popular technology for the power grid system. In order to optimize
the power supply and distribution, and to provide personalized services by service …
the power supply and distribution, and to provide personalized services by service …
Ambient intelligence in business environments and internet of things transformation guidelines
Ambient intelligence (AmI) is an emerging paradigm bringing intelligence into our lives with
the help of intelligent interfaces and smart environments. AmI has the potential to affect our …
the help of intelligent interfaces and smart environments. AmI has the potential to affect our …
[PDF][PDF] Dynamic privacy adaptation in ubiquitous computing
FM Schaub - 2014 - oparu.uni-ulm.de
Ubiquitous computing is characterized by the integration of computing aspects into the
physical environment. Physical objects gain digital sensing, processing, and communication …
physical environment. Physical objects gain digital sensing, processing, and communication …