Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
Detecting malicious software (malware) is important for computer security. Among the
different types of malware, zero-day malware is problematic because it cannot be removed …
different types of malware, zero-day malware is problematic because it cannot be removed …
A survey on zero-day polymorphic worm detection techniques
Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …
to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not …
Method and system for detecting malicious and/or botnet-related domain names
(57) ABSTRACT A method and system of detecting a malicious and/or botnet-related
domain name, comprising: reviewing a domain name used in Domain Name System (DNS) …
domain name, comprising: reviewing a domain name used in Domain Name System (DNS) …
Obfuscated malware detection using deep generative model based on global/local features
As a large amount of malicious software (malware), including DDoS or Trojan horse pervade
in communication networks, several approaches based on global and local features have …
in communication networks, several approaches based on global and local features have …
Method and system for detecting and responding to attacking networks
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
Malware detection using deep transferred generative adversarial networks
Malicious software is generated with more and more modified features of which the methods
to detect malicious software use characteristics. Automatic classification of malicious …
to detect malicious software use characteristics. Automatic classification of malicious …
Method and system for determining whether domain names are legitimate or malicious
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
Method and system for detecting malicious domain names at an upper DNS hierarchy
7,277,961 7,331,060 7,372,809 7,383,577 7,424,619 7,426,576 7,448,084 7,483,947 7.487,
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
Method and system for detecting malware
A system and method of analysis. NX domain names are collected from an asset in a real
network. The NX domain names are domain names that are not registered. The real network …
network. The NX domain names are domain names that are not registered. The real network …
Method and system for network-based detecting of malware from behavioral clustering
(57) ABSTRACT A computerized system and method for performing behav ioral clustering of
malware samples, comprising: executing malware samples in a controlled computer …
malware samples, comprising: executing malware samples in a controlled computer …