Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection
The growth within the Internet and communications areas have led to a massive surge in the
dimension of network and data. Consequently, several new threats are being created and …
dimension of network and data. Consequently, several new threats are being created and …
[HTML][HTML] Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior
Security issues are the most critical challenges facing new technologies associated with the
internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion …
internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion …
Metaheuristic algorithms in network intrusion detection
An intrusion detection system (IDS) is a network security scheme that identifies, discovers,
and tracks a network invader or attacker. With the rapid growth of the Internet, wireless …
and tracks a network invader or attacker. With the rapid growth of the Internet, wireless …
[PDF][PDF] VPN and Non-VPN Network Traffic Classification Using Time-Related Features.
The continual growth of the use of technological appliances during the COVID-19 pandemic
has resulted in a massive volume of data flow on the Internet, as many employees have …
has resulted in a massive volume of data flow on the Internet, as many employees have …
Exposing bot attacks using machine learning and flow level analysis
Botnets represent a major threat to Internet security that have continuously developed in
scale and complexity. Command-and-control servers (C&C) send commands to bots that …
scale and complexity. Command-and-control servers (C&C) send commands to bots that …
Tor network traffic classification using machine learning based on time-related feature
Application-level defensive security controls like Intrusion Detection and Prevention Systems
(IDS/IPS) need to have visibility on the application data portion of the processed network …
(IDS/IPS) need to have visibility on the application data portion of the processed network …
Facilitating secure web browsing by utilizing supervised filtration of malicious URLs
A Elqasass, I Aljundi, M Al-Fayoumi… - … Conference on IoT Based …, 2023 - Springer
Nowadays, Internet use by all people has become a daily matter, whether to do business,
buy online, education, entertainment, or social communication. Therefore, attackers exploit …
buy online, education, entertainment, or social communication. Therefore, attackers exploit …
Machine learning for data mining, data science and data analytics
The first article,“Mathura (MBI)-A Novel Imputation Measure for Imputation of Missing Values
in Medical Datasets,” is written by B. Mathura Bai, N. Mangathayaru, B. Padmaja Rani, and …
in Medical Datasets,” is written by B. Mathura Bai, N. Mangathayaru, B. Padmaja Rani, and …
[PDF][PDF] Intelligent Systems with Applications
MU Hossain, MA Rahman, MM Islam, A Akhter… - 2022 - researchgate.net
abstract Recently, the number of road accidents has been increased worldwide due to the
distraction of the drivers. This rapid road crush often leads to injuries, loss of properties …
distraction of the drivers. This rapid road crush often leads to injuries, loss of properties …
Exploration on Malicious Encrypted Traffic Classification Based on Deep Learning
K Cheng, R Qiu, L Li, L Liang, T Liu… - 2023 International …, 2023 - ieeexplore.ieee.org
In recent years, encrypted traffic has become the main means of network attacks, especially
the use of encrypted traffic for network attacks is becoming increasingly common. In real life …
the use of encrypted traffic for network attacks is becoming increasingly common. In real life …