Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital twin: A comprehensive survey of security threats
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
The watchful eye: investigating tourist perceptions of different wireless tracking technologies at a travel destination
S Lee, B Sung, J Kitin - Current Issues in Tourism, 2024 - Taylor & Francis
Wireless tracking technologies is an emerging technology used in tourism destinations to
better understand the movement of tourists and to develop more personalized products …
better understand the movement of tourists and to develop more personalized products …
A novel user centric privacy mechanism in cyber physical system
User-centric privacy preservation is of paramount importance in the realm of Cyber-Physical
Systems (CPS), where making decisions based on nature of data is crucial. This abstract …
Systems (CPS), where making decisions based on nature of data is crucial. This abstract …
Cloud-based cyber physical systems: Design challenges and security needs
YB Reddy - 2014 10th International Conference on Mobile Ad …, 2014 - ieeexplore.ieee.org
The cyber-physical systems are the combination of computational elements and physical
entities that can interact with humans through many modalities. The security includes the …
entities that can interact with humans through many modalities. The security includes the …
Guidelines for data privacy compliance: A focus on cyber-physical systems and internet of things
N Baloyi, P Kotzé - Proceedings of the South African Institute of …, 2019 - dl.acm.org
Privacy as a human right has been in existence for decades, but its effects are accentuated
in the information age. Data privacy compliance in modern information technology …
in the information age. Data privacy compliance in modern information technology …
Lightweight password hashing scheme for embedded systems
Passwords constitute the main mean for authentication in computer systems. In order to
maintain the user-related information at the service provider end, password hashing …
maintain the user-related information at the service provider end, password hashing …
A pattern-based approach for designing reliable cyber-physical systems
Cyber-Physical Systems (CPS) appear to be of paramount importance due to their
increasing use on critical infrastructure. New challenges have occurred because of the …
increasing use on critical infrastructure. New challenges have occurred because of the …
Wsacd-a usable access control framework for smart home devices
Computing devices already permeate working and living environments; a trend which is
expected to intensify in the coming years. However, the direct interaction smart devices often …
expected to intensify in the coming years. However, the direct interaction smart devices often …
Embedded systems security for cyber-physical systems
Embedded systems have become a core component in today's technological era.
Embedded systems are a combination of hardware and software specially designed to …
Embedded systems are a combination of hardware and software specially designed to …
Log your car: reliable maintenance services record
A maintenance services logging system is a useful tool for car owners to keep track of the
car's condition and also can increase the market value of the car. Logging systems range …
car's condition and also can increase the market value of the car. Logging systems range …