Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on machine learning‐based intrusion detection systems for secure communication in internet of things
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …
smart objects (things) that can continuously sense the events in their sensing domain and …
Adoption of cloud computing as innovation in the organization
Over the years, there has been a heavy reliance on cloud computing as IT has innovated
through time. In recent times cloud computing has grown monumentally. Many organizations …
through time. In recent times cloud computing has grown monumentally. Many organizations …
A survey of intelligent transmission line inspection based on unmanned aerial vehicle
Y Luo, X Yu, D Yang, B Zhou - Artificial Intelligence Review, 2023 - Springer
With the development of the new generation of information technology, artificial intelligence,
cloud computing and big data are gradually becoming powerful engines of the smart grid. In …
cloud computing and big data are gradually becoming powerful engines of the smart grid. In …
Distributed Deep CNN‐LSTM Model for Intrusion Detection Method in IoT‐Based Vehicles
As 5G and other technologies are widely used in the Internet of Vehicles, intrusion detection
plays an increasingly important role as a vital detection tool for information security …
plays an increasingly important role as a vital detection tool for information security …
Phishing email detection model using deep learning
S Atawneh, H Aljehani - Electronics, 2023 - mdpi.com
Email phishing is a widespread cyber threat that can result in the theft of sensitive
information and financial loss. It uses malicious emails to trick recipients into providing …
information and financial loss. It uses malicious emails to trick recipients into providing …
An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach
S Sokkalingam, R Ramakrishnan - … and Computation: Practice …, 2022 - Wiley Online Library
Cloud computing offers comfortable service to business sectors as they can concentrate on
their products. Over the internet, cloud computing is liable to various security threats and …
their products. Over the internet, cloud computing is liable to various security threats and …
Network intrusion detection based on the temporal convolutional model
Recurrent networks have been adopted as default architecture in approaches performing
sequence modelling of network intrusion detection problems. However, models based on …
sequence modelling of network intrusion detection problems. However, models based on …
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications
Abstract Intrusion Detection Systems (IDS) based on deep learning models can identify and
mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models …
mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models …
An enhanced intrusion detection system for IoT networks based on deep learning and knowledge graph
X Yang, G Peng, D Zhang, Y Lv - Security and Communication …, 2022 - Wiley Online Library
Nowadays, the intrusion detection system (IDS) plays a crucial role in the Internet of Things
(IoT) networks, which could effectively protect sensitive data from various attacks. However …
(IoT) networks, which could effectively protect sensitive data from various attacks. However …
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction
Understanding the current threat landscape as well as timely detection of imminent attacks
are primary objectives of cyber security. Through time-series modeling of security data, such …
are primary objectives of cyber security. Through time-series modeling of security data, such …