Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues
M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …
information technology have accelerated the deployment of billions of interconnected, smart …
[HTML][HTML] Biometrics for internet-of-things security: A review
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …
devices and consumers makes security critical to an IoT environment. Biometrics offers an …
Analyzing the impact of social networks and social behavior on electronic business during COVID-19 pandemic
C Luo - Information Processing & Management, 2021 - Elsevier
The Covid-19 pandemic caused substantial changes, particularly concerning marketing,
which led to high digital use. Social networking enables people to communicate easily with …
which led to high digital use. Social networking enables people to communicate easily with …
Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems
With the tremendous growth of Information and Communications Technology (ICT), Cyber
Physical Systems (CPS) have opened the door for many potential applications ranging from …
Physical Systems (CPS) have opened the door for many potential applications ranging from …
An authenticated key exchange protocol for multi-server architecture in 5G networks
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …
amount of data, so multi-server distributed cloud computing has been widely used in various …
A review of fingerprint sensors: Mechanism, characteristics, and applications
Y Yu, Q Niu, X Li, J Xue, W Liu, D Lin - Micromachines, 2023 - mdpi.com
Identification technology based on biometrics is a branch of research that employs the
unique individual traits of humans to authenticate identity, which is the most secure method …
unique individual traits of humans to authenticate identity, which is the most secure method …
Edge computing based healthcare systems: Enabling decentralized health monitoring in Internet of medical Things
The rapid development of IoMT facilitates pervasive healthcare networks. However,
numerous MUs lead to deficient wireless channel and computation resources. Edge …
numerous MUs lead to deficient wireless channel and computation resources. Edge …
Recent advances in wearable sensing technologies
AJ Perez, S Zeadally - Sensors, 2021 - mdpi.com
Wearable sensing technologies are having a worldwide impact on the creation of novel
business opportunities and application services that are benefiting the common citizen. By …
business opportunities and application services that are benefiting the common citizen. By …
Threats and corrective measures for IoT security with observance of cybercrime: A survey
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …