Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Swarmtrust: A swarm optimization-based approach to enhance trustworthiness in smart homes
As smart home networks become increasingly complex and dynamic, maintaining trust
between the various devices and services is crucial. Existing trust management approaches …
between the various devices and services is crucial. Existing trust management approaches …
Reputation based approach for improved fairness and robustness in P2P protocols
Abstract Peer-to-Peer (P2P) overlay networks have gained popularity due to their
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …
Protection against semantic social engineering attacks
Phishing, drive-by downloads, file and multimedia masquerading, domain typosquatting,
malvertising and other semantic social engineering attacks aim to deceive the user rather …
malvertising and other semantic social engineering attacks aim to deceive the user rather …
A mechanism for resource pricing and fairness in peer-to-peer networks
S Li, W Sun - Electronic Commerce Research, 2016 - Springer
In peer-to-peer (P2P) networks, each peer acts as the role of client and server. As a client,
each peer is regarded as a service customer. It sends requests to other peers to download …
each peer is regarded as a service customer. It sends requests to other peers to download …
Security and fairness in IoT based e-Health system: A case study of mobile edge-clouds
Through IoT, humans and objects can be connected seamlessly, to guaranty improved
quality of service (QoS). IoT-driven e-Health systems benefit from such rich network setting …
quality of service (QoS). IoT-driven e-Health systems benefit from such rich network setting …
Reputation-based security system for edge computing
Given the centralized architecture of cloud computing, there is a genuine concern about its
ability to adequately cope with the demands of connecting devices which are sharply …
ability to adequately cope with the demands of connecting devices which are sharply …
Trust management in collaborative systems for critical infrastructure protection
Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several
security policies must be applied among the organizations of CI. Based on our conducted …
security policies must be applied among the organizations of CI. Based on our conducted …
[KNJIGA][B] Sociological perspectives on media piracy in the Philippines and Vietnam
VO Ballano - 2016 - Springer
Media piracy or the counterfeiting of copyrighted film, music, video games, computer and
music videos, and other digital media products and services has become an urgent and …
music videos, and other digital media products and services has become an urgent and …
Adaptive approach to restraining content pollution in peer-to-peer networks
Abstract Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In
such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected …
such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected …
Designing and verifying a P2P service security protocol in M2M environment
WS Bae - Peer-to-Peer Networking and Applications, 2016 - Springer
Multifunctional high-performance electronic systems in M2M (Machine-to-Machine) industry
have been evolving substantially in tandem with the advancement of IT. M2M, standing for …
have been evolving substantially in tandem with the advancement of IT. M2M, standing for …