Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Current approaches and future directions for cyber threat intelligence sharing: A survey
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …
[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …
Ethertwin: Blockchain-based secure digital twin information management
Digital Twins are complex digital representations of assets that are used by a variety of
organizations across the Industry 4.0 value chain. As the digitization of industrial processes …
organizations across the Industry 4.0 value chain. As the digitization of industrial processes …
Towards secure and practical consensus for blockchain based VANET
The massive adoption of the blockchain-based distributed framework has made it possible
to store and transmit Vehicular Ad Hoc Network (VANET) application data transparently …
to store and transmit Vehicular Ad Hoc Network (VANET) application data transparently …
Cyber threat intelligence on blockchain: A systematic literature review
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
[HTML][HTML] Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof
Z Ren, E Yan, T Chen, Y Yu - Journal of King Saud University-Computer …, 2024 - Elsevier
Nowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based
Encryption (CP-ABE) has drawn the researcher attention because it can provide key security …
Encryption (CP-ABE) has drawn the researcher attention because it can provide key security …
[HTML][HTML] A systematic review of blockchain for consent management
PV Kakarlapudi, QH Mahmoud - Healthcare, 2021 - mdpi.com
Blockchain technology was introduced through Bitcoin in a 2008 whitepaper by the
mysterious Satoshi Nakamoto. Since its inception, it has gathered great attention because of …
mysterious Satoshi Nakamoto. Since its inception, it has gathered great attention because of …
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT
Industrial Internet of Things (IIoT) opens up a challenging research area towards improving
secure data sharing which currently has several limitations. Primarily, the lack of inbuilt …
secure data sharing which currently has several limitations. Primarily, the lack of inbuilt …
Distributed security framework for reliable threat intelligence sharing
D Preuveneers, W Joosen… - Security and …, 2020 - Wiley Online Library
Computer security incident response teams typically rely on threat intelligence platforms for
information about sightings of cyber threat events and indicators of compromise. Other …
information about sightings of cyber threat events and indicators of compromise. Other …
Blockchain for cybersecurity: systematic literature review and classification
Blockchain has transitioned beyond the hype to reality, as evidenced by the amount of
research it has attracted and by its commercial applications. One popular application of …
research it has attracted and by its commercial applications. One popular application of …