Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system
A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …
academics' and business information systems' attention in recent years. The Internet of …
Empowering network security with programmable switches: A comprehensive survey
With the growth of network applications such as 5G and artificial intelligence, network
security techniques, ie, the techniques that detect various attacks (eg, well-known denial-of …
security techniques, ie, the techniques that detect various attacks (eg, well-known denial-of …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Privacy leakage of location sharing in mobile social networks: Attacks and defense
Along with the popularity of mobile social networks (MSNs) is the increasing danger of
privacy breaches due to user location exposures. In this work, we take an initial step towards …
privacy breaches due to user location exposures. In this work, we take an initial step towards …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
A mobile malware detection method using behavior features in network traffic
Android has become the most popular mobile platform due to its openness and flexibility.
Meanwhile, it has also become the main target of massive mobile malware. This …
Meanwhile, it has also become the main target of massive mobile malware. This …
{vTZ}: virtualizing {ARM}{TrustZone}
ARM TrustZone, a security extension that provides a secure world, a trusted execution
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
With the proliferation of the smart Internet of Things (IoT) devices based on Android system,
malicious Android applications targeting for IoT devices have received more and more …
malicious Android applications targeting for IoT devices have received more and more …
A two-layer deep learning method for android malware detection using network traffic
J Feng, L Shen, Z Chen, Y Wang, H Li - Ieee Access, 2020 - ieeexplore.ieee.org
Because of the characteristic of openness and flexibility, Android has become the most
popular mobile platform. However, it has also become the most targeted system by mobile …
popular mobile platform. However, it has also become the most targeted system by mobile …