Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey for user behavior analysis based on machine learning techniques: current models and applications
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …
understanding, modeling and predicting past, present and future behaviors of users …
Threat intelligence computing
Cyber threat hunting is the process of proactively and iteratively formulating and validating
threat hypotheses based on security-relevant observations and domain knowledge. To …
threat hypotheses based on security-relevant observations and domain knowledge. To …
[HTML][HTML] Malicious JavaScript detection based on bidirectional LSTM model
X Song, C Chen, B Cui, J Fu - Applied Sciences, 2020 - mdpi.com
JavaScript has been widely used on the Internet because of its powerful features, and
almost all the websites use it to provide dynamic functions. However, these dynamic natures …
almost all the websites use it to provide dynamic functions. However, these dynamic natures …
Blocking javascript without breaking the web: An empirical investigation
Modern websites heavily rely on JavaScript (JS) to implement legitimate functionality as well
as privacy-invasive advertising and tracking. Browser extensions such as NoScript block any …
as privacy-invasive advertising and tracking. Browser extensions such as NoScript block any …
A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks
In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where
a primary base station sends a message to a primary user. Meanwhile, a secondary user …
a primary base station sends a message to a primary user. Meanwhile, a secondary user …
A review of cloned mobile malware applications for android devices
M Baykara, E Çolak - … on digital forensic and security (ISDFS), 2018 - ieeexplore.ieee.org
With the increased mobile applications popularity, fraud methods have become a big
problem in this area. Every smartphone definitely has at least one mobile application. These …
problem in this area. Every smartphone definitely has at least one mobile application. These …
Jsless: A tale of a fileless javascript memory-resident malware
New computing paradigms, modern feature-rich programming languages and off-the-shelf
software libraries enabled the development of new sophisticated malware families …
software libraries enabled the development of new sophisticated malware families …
Jsac: A novel framework to detect malicious javascript via cnns over ast and cfg
H Liang, Y Yang, L Sun, L Jiang - 2019 International Joint …, 2019 - ieeexplore.ieee.org
JavaScript (JS) is a dominant programming language in web/mobile development, while it is
also notoriously abused by attackers due to its powerful characteristics, eg, dynamic …
also notoriously abused by attackers due to its powerful characteristics, eg, dynamic …
Behavior model construction for client side of modern web applications
W Wang, J Guo, Z Li, R Zhao - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
Most of the behavior models with respect to Web applications focus on sequencing of
events, without regard for the changes of parameters or elements and the relationship …
events, without regard for the changes of parameters or elements and the relationship …
Spider bird swarm algorithm with deep belief network for malicious JavaScript detection
JavaScript is employed in vast scenarios like web applications, NodeJS, and hybrid-mobile
applications. Moreover, JavaScript is a core component in the social network because of its …
applications. Moreover, JavaScript is a core component in the social network because of its …