Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on the cyber security
In recent years, the Internet has become an integral element of people's everyday lifestyles
all across the world. Online criminality, on the other hand, has risen in tandem with the …
all across the world. Online criminality, on the other hand, has risen in tandem with the …
Cyber security threats and vulnerabilities: a systematic map** study
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …
cyber applications and to avoid key security threats faced by these applications. The goal of …
Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI
Abstract As Artificial Intelligence (AI) rapidly advances and integrates into various domains,
cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI …
cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI …
Blockchain technology in logistics and supply chain management—A bibliometric literature review from 2016 to January 2020
B Müßigmann, H von der Gracht… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
As part of business and management studies, research works addressed blockchain
technology (BCT) in logistics and supply chain management (LSCM) first in 2016. Increasing …
technology (BCT) in logistics and supply chain management (LSCM) first in 2016. Increasing …
A survey on technical threat intelligence in the age of sophisticated cyber attacks
W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …
traditional security based on heuristic and signature does not match the dynamic nature of …
Uncertainty, knowledge problems, and entrepreneurial action
Whether new business ventures emerge in the context of start-ups or corporate giants, one
of the enduring and fundamental assumptions underlying theories of entrepreneurial action …
of the enduring and fundamental assumptions underlying theories of entrepreneurial action …
Supply chain 4.0: A survey of cyber security challenges, solutions and future directions
Supply chain 4.0 denotes the fourth revolution of supply chain management systems,
integrating manufacturing operations with telecommunication and Information Technology …
integrating manufacturing operations with telecommunication and Information Technology …
Software-defined networking: A comprehensive survey
The Internet has led to the creation of a digital society, where (almost) everything is
connected and is accessible from anywhere. However, despite their widespread adoption …
connected and is accessible from anywhere. However, despite their widespread adoption …
A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Applying routine activity theory to cybercrime: A theoretical and empirical analysis
The central question of this article is whether routine activity theory (RAT) can be used as an
analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …
analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …