Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Mobile health application security assesment based on owasp top 10 mobile vulnerabilities
DF Priambodo, GS Ajie, HA Rahman… - 2022 international …, 2022 - ieeexplore.ieee.org
The increase of smartphone users in Indonesia is the reason for various sectors to improve
their services through mobile applications, including the healthcare sector. The healthcare …
their services through mobile applications, including the healthcare sector. The healthcare …
A vulnerability risk assessment method based on heterogeneous information network
W Wang, F Shi, M Zhang, C Xu, J Zheng - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the increasing number of network security vulnerabilities, vulnerability risk
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …
Hardening SAML by integrating SSO and multi-factor authentication (MFA) in the cloud
Even though the cloud paradigm and its associated services has been adopted in various
enterprise applications, there has been major issues with regard to authenticating users' …
enterprise applications, there has been major issues with regard to authenticating users' …
Cuckoo's malware threat scoring and classification: Friend or foe?
Malware threat classification involves understanding the behavior of the malicious software
and how it affects a victim host system. Classifying threats allows for measured response …
and how it affects a victim host system. Classifying threats allows for measured response …
CVSS-based vulnerability and risk assessment for high performance computing networks
JK Debnath, D **e - 2022 IEEE International Systems …, 2022 - ieeexplore.ieee.org
Common Vulnerability Scoring System (CVSS) is intended to capture the key characteristics
of a vulnerability and correspondingly produce a numerical score to indicate the severity …
of a vulnerability and correspondingly produce a numerical score to indicate the severity …
Cyber security threat awareness framework for high school students in Qatar
M Al-Tajer, RA Ikuesan - arxiv preprint arxiv:2207.00820, 2022 - arxiv.org
Cyber security is considered a necessity for anyone in todays modern world. Awareness of
cyber security standards and best practices have become mandatory to safeguard ones …
cyber security standards and best practices have become mandatory to safeguard ones …
Research on network risk evaluation method based on a differential manifold
X Zhao, Y Zhang, J Xue, C Shan, Z Liu - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid development of networks, network security is a serious problem. To evaluate
a network accurately, this paper proposes a network risk evaluation method based on a …
a network accurately, this paper proposes a network risk evaluation method based on a …
Forensic profiling of cyber-security adversaries based on incident similarity measures interaction index
In today's complex cyber space, forecasting the likelihood or probability that a Cyber
Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked …
Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked …
Conceptual model for crowd-sourcing digital forensic evidence
COVID-19 scourge has made it challenging to combat digital crimes due to the complexity of
attributing potential security incidents to perpetrators. Existing literature does not accurately …
attributing potential security incidents to perpetrators. Existing literature does not accurately …