Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
Malware threat affecting financial organization analysis using machine learning approach
Since 2014, Emotet has been using man-in-the-browsers (MITB) attacks to target companies
in the finance industry and their clients. Its key aim is to steal victims' online money-lending …
in the finance industry and their clients. Its key aim is to steal victims' online money-lending …
Logical concept map** and social media analytics relating to cyber criminal activities for ontology creation
R Rawat - International Journal of Information Technology, 2023 - Springer
The backbone of the semantic web is ontology, dealing with the context of details associated
with a specific domain. Domain ontology (DO) is an important source of information for …
with a specific domain. Domain ontology (DO) is an important source of information for …
Autonomous artificial intelligence systems for fraud detection and forensics in dark web environments
Artificial Intelligence (AI) influenced technical aspects of research for generating automated
intelligent behaviors covering divergent domains but has shown appreciable results when …
intelligent behaviors covering divergent domains but has shown appreciable results when …
Ethically contentious aspects of artificial intelligence surveillance: a social science perspective
T Saheb - AI and Ethics, 2023 - Springer
Artificial intelligence and its societal and ethical implications are complicated and
conflictingly interpreted. Surveillance is one of the most ethically challenging concepts in AI …
conflictingly interpreted. Surveillance is one of the most ethically challenging concepts in AI …
Mobile operating system (Android) vulnerability analysis using machine learning
Because of the computational processing, seamless functioning and benefits that it gives to
Android-users, cyber thieves have been drawn towards it. Conventional AMD: android …
Android-users, cyber thieves have been drawn towards it. Conventional AMD: android …
Organ trafficking on the dark web—The data security and privacy concern in healthcare systems
On the dark web (DW), criminal's are technologically knowledgeable so security agencies
must keep up to speed with all data sources in endeavors to find criminals and identify their …
must keep up to speed with all data sources in endeavors to find criminals and identify their …
Anonymous trading on the dark online marketplace: An exploratory study
Advancement in technology provides numerous solutions to not only legitimate businesses
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …
but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
Cyber security issues relating to thermal power stations (TPS) are the major focus of concern
towards the development of digital computing equipment. Stuxnet, the computer virus that …
towards the development of digital computing equipment. Stuxnet, the computer virus that …
Cyber warfare threat categorization on cps by dark web terrorist
The Industrial Internet of Things (IIoT) also referred as Cyber Physical Systems (CPS) as
critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …
critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …