Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain for modern applications: A survey
Blockchain is a modern technology that has revolutionized the way society interacts and
trades. It could be defined as a chain of blocks that stores information with digital signatures …
trades. It could be defined as a chain of blocks that stores information with digital signatures …
Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework
The complex and interdependent nature of smart cities raises significant political, technical,
and socioeconomic challenges for designers, integrators and organisations involved in …
and socioeconomic challenges for designers, integrators and organisations involved in …
Are formal methods applicable to machine learning and artificial intelligence?
Formal approaches can provide strict correctness guarantees for the development of both
hardware and software systems. In this work, we examine state-of-the-art formal methods for …
hardware and software systems. In this work, we examine state-of-the-art formal methods for …
Security challenges for drone communications: Possible threats, attacks and countermeasures
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …
repercussions, in particular for employment and industrial development, with the key to …
[HTML][HTML] Formal methods and validation techniques for ensuring automotive systems security
M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …
about their vulnerability to security breaches. As a result, the integration of formal methods …
An OWASP top ten driven survey on web application protection methods
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …
Anomalies detection through smartphone sensors: A review
M Krichen - IEEE Sensors Journal, 2021 - ieeexplore.ieee.org
With smartphones being so ubiquitous, more connected and largely fitted with several types
of sensors such as GPS, microphones, cameras, magnetometers, accelerometers, etc; there …
of sensors such as GPS, microphones, cameras, magnetometers, accelerometers, etc; there …
[HTML][HTML] Automatic verification and execution of cyber attack on IoT devices
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …
Privacy risk assessment of smart home system based on a STPA–FMEA method
Y Wang, R Zhang, X Zhang, Y Zhang - Sensors, 2023 - mdpi.com
Although the smart home industry is rapidly emerging, it faces the risk of privacy security that
cannot be neglected. As this industry now has a complex combination system involving …
cannot be neglected. As this industry now has a complex combination system involving …
A survey on runtime testing of dynamically adaptable and distributed systems
This article addresses the need of applying testing activities with the purpose of checking the
consistency and the correctness of distributed and dynamically adaptable systems whose …
consistency and the correctness of distributed and dynamically adaptable systems whose …