Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic map** study on security approaches in secure software engineering
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …
integral component of human society. Such wide use of software systems consists of large …
[HTML][HTML] Systematic literature review on security access control policies and techniques based on privacy requirements in a BYOD environment: State of the art and …
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …
Hybrid MCDM model for location of logistics hub: A case in China under the belt and road initiative
X Zhang, J Lu, Y Peng - Ieee Access, 2021 - ieeexplore.ieee.org
The location of logistics nodes that facilitate the China Railway Express (CRexpress) and
rail-sea intermodal transportation has received increasing attention in China under the Belt …
rail-sea intermodal transportation has received increasing attention in China under the Belt …
An integrated rough-fuzzy WINGS-ISM method with an application in ASSCM
M Wang, Y Zhang, Y Tian, K Zhang - Expert Systems with Applications, 2023 - Elsevier
Environmental deterioration, the COVID-19 pandemic and the Russian-Ukrainian conflict
had brought chronic and dramatic impacts on agricultural supply chain around the world …
had brought chronic and dramatic impacts on agricultural supply chain around the world …
[HTML][HTML] Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health
The emergence of the Internet of Things (IoT) has sparked a profound transformation in the
field of digital health, leading to the rise of the Internet of Medical Things (IoMT). These IoT …
field of digital health, leading to the rise of the Internet of Medical Things (IoMT). These IoT …
A novel security framework to mitigate and avoid unexpected security threats in saudi arabia
A Alshammari - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Many organizations around the world suffer large losses due to unexpected risks which can
have a profound impact on their survival. This paper presents a novel security framework to …
have a profound impact on their survival. This paper presents a novel security framework to …
Risk evaluation and attack detection in heterogeneous IoMT devices using hybrid fuzzy logic analytical approach
The rapidly expanding Internet of Medical Things (IoMT) landscape fosters enormous
opportunities for personalized healthcare, yet it also exposes patients and healthcare …
opportunities for personalized healthcare, yet it also exposes patients and healthcare …
Information security maturity model for healthcare organizations in the United States
B Barnes, T Daim - IEEE Transactions on Engineering …, 2022 - ieeexplore.ieee.org
Thisarticle provides a maturity model for information security for healthcare organizations in
the United States. Healthcare organizations are faced with increasing threats to the security …
the United States. Healthcare organizations are faced with increasing threats to the security …
[HTML][HTML] Security management of BYOD and cloud environment in Saudi Arabia
The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge
in the risks related to network security. This trend is very beneficial to employers and …
in the risks related to network security. This trend is very beneficial to employers and …
A framework of software project scope definition elements: An ISM-DEMATEL approach
Software project scope definition is complicated due to the diversity and magnitude of the
information needed. An inadequate scope definition often results in project failure as it …
information needed. An inadequate scope definition often results in project failure as it …