Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …
security threats in internet-enabled networks, with many internet of things (IoT) devices …
Named data networking: a survey
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …
with specific IP addresses interacted over a pre-established communication channel. This …
A robust SVM-based approach with feature selection and outliers detection for classification problems
This paper proposes a robust classification model, based on support vector machine (SVM),
which simultaneously deals with outliers detection and feature selection. The classifier is …
which simultaneously deals with outliers detection and feature selection. The classifier is …
An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and -NN
L Li, Y Yu, S Bai, Y Hou, X Chen - IEEE Access, 2017 - ieeexplore.ieee.org
Intrusion detection has been an important countermeasure to secure computing
infrastructures from malicious attacks. To improve detection performance and reduce bias …
infrastructures from malicious attacks. To improve detection performance and reduce bias …
Intrusion response systems: Foundations, design, and challenges
In the last few decades, various network attacks have emerged. This phenomenon requires
serious consideration to address its extensive consequences. To overcome the effects of …
serious consideration to address its extensive consequences. To overcome the effects of …
Interest flooding attacks in named data networking: survey of existing solutions, open issues, requirements, and future directions
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric
Networking. The NDN architecture adopts name-based routing and location-independent …
Networking. The NDN architecture adopts name-based routing and location-independent …
An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities
A Karami - Expert Systems with Applications, 2018 - Elsevier
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and
visualization techniques has considerably become an important research topic to protect …
visualization techniques has considerably become an important research topic to protect …
Self-organizing RBF neural network using an adaptive gradient multiobjective particle swarm optimization
H Han, X Wu, L Zhang, Y Tian… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
One of the major obstacles in using radial basis function (RBF) neural networks is the
convergence toward local minima instead of the global minima. For this reason, an adaptive …
convergence toward local minima instead of the global minima. For this reason, an adaptive …
Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection
Intrusion detection has become important to network security because of the increasing
connectivity between computers and internet. Various Intrusion Detection Systems have …
connectivity between computers and internet. Various Intrusion Detection Systems have …
Towards effective network intrusion detection: A hybrid model integrating gini index and GBDT with PSO
L Li, Y Yu, S Bai, J Cheng, X Chen - Journal of Sensors, 2018 - Wiley Online Library
In order to protect computing systems from malicious attacks, network intrusion detection
systems have become an important part in the security infrastructure. Recently, hybrid …
systems have become an important part in the security infrastructure. Recently, hybrid …