Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on data augmentation for text classification
Data augmentation, the artificial creation of training data for machine learning by
transformations, is a widely studied research field across machine learning disciplines …
transformations, is a widely studied research field across machine learning disciplines …
The impact of organizational structure and technology use on collaborative practices in computer emergency response teams: An empirical study
Besides the merits of increasing digitization and interconnectedness in private and
professional spaces, critical infrastructures and societies are more and more exposed to …
professional spaces, critical infrastructures and societies are more and more exposed to …
Values and value conflicts in the context of OSINT technologies for cybersecurity incident response: a value sensitive design perspective
The negotiation of stakeholder values as a collaborative process throughout technology
development has been studied extensively within the fields of Computer Supported …
development has been studied extensively within the fields of Computer Supported …
[PDF][PDF] Cyber threat observatory: Design and evaluation of an interactive dashboard for computer emergency response teams
MA Kaufhold, AS Basyurt, K Eyilmez, M Stöttinger… - 2022 - core.ac.uk
Computer emergency response teams (CERTs) of the public sector provide preventive and
reactive cybersecurity services for authorities, citizens, and enterprises. However, their tasks …
reactive cybersecurity services for authorities, citizens, and enterprises. However, their tasks …
Technology Assessment of Dual-Use ICTs
Thea Riebe How to Assess Diffusion, Governance and Design Page 1 Thea Riebe Technology
Assessment of Dual-Use ICTs How to Assess Diffusion, Governance and Design Page 2 …
Assessment of Dual-Use ICTs How to Assess Diffusion, Governance and Design Page 2 …
Big data and multi-platform social media services in disaster management
The use of social media today is not only ubiquitous and an integral part of everyday life but
is also increasingly relevant before, during, or after emergencies. Data produced in these …
is also increasingly relevant before, during, or after emergencies. Data produced in these …
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence
Cyber Situational Awareness (CSA) is an important element in both cyber security and cyber
defence to inform processes and activities on strategic, tactical, and operational level …
defence to inform processes and activities on strategic, tactical, and operational level …
The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions
Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic
field like cybersecurity, gathering up-to-date information is usually a manual, time …
field like cybersecurity, gathering up-to-date information is usually a manual, time …
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
K Eyilmez, A Basyurt, S Stieglitz, C Fuchss, C Reuter… - 2022 - aisel.aisnet.org
Over the past few decades, the number and variety of cyberattacks and malware patterns
have increased immensely. As a countermeasure, computer emergency response teams …
have increased immensely. As a countermeasure, computer emergency response teams …