Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …
attacks to exploit the information occurs. A technology to store and maintain user's …
Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities
Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional
technological sector (eg, oil and gas industry). There are, however, a number of research …
technological sector (eg, oil and gas industry). There are, however, a number of research …
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …
technology, as the connected environment offers various alternatives for electrical data …
Block-DEF: A secure digital evidence framework using blockchain
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
Controllable and trustworthy blockchain-based cloud data management
In recent years, there have been efforts to deploy blockchain in a broad range of
applications and in different domains, such as the critical infrastructure sectors. Generally …
applications and in different domains, such as the critical infrastructure sectors. Generally …
A guide to fully homomorphic encryption
Fully homomorphic encryption (FHE) has been dubbed the holy grail of cryptography, an
elusive goal which could solve the IT world's problems of security and trust. Research in the …
elusive goal which could solve the IT world's problems of security and trust. Research in the …
Optimal resource allocation using reinforcement learning for IoT content-centric services
The exponential growing rate of the networking technologies has led to a dramatical large
scope of the connected computing environment. Internet-of-Things (IoT) is considered an …
scope of the connected computing environment. Internet-of-Things (IoT) is considered an …
An integrated cyber security risk management approach for a cyber-physical system
A cyber-physical system (CPS) is a combination of physical system components with cyber
capabilities that have a very tight interconnectivity. CPS is a widely used technology in many …
capabilities that have a very tight interconnectivity. CPS is a widely used technology in many …
Task migration for mobile edge computing using deep reinforcement learning
C Zhang, Z Zheng - Future Generation Computer Systems, 2019 - Elsevier
Mobile edge computing (MEC) is a new network architecture that puts computing
capabilities and storage resource at the edges of the network in a distributed manner …
capabilities and storage resource at the edges of the network in a distributed manner …
[HTML][HTML] Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
The recent advancement in Information and Communication Technology (ICT) has
undoubtedly improved services in all sectors in the world. Specifically, Information …
undoubtedly improved services in all sectors in the world. Specifically, Information …