Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
Intrusion detection system: A comprehensive review
HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of network and computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …
detection systems (IDSs) has received a lot of attention throughout the computer science …
A comprehensive survey on DDoS defense systems: New trends and challenges
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
Real-time multistep attack prediction based on hidden markov models
P Holgado, VA Villagrá… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A novel method based on the Hidden Markov Model is proposed to predict multistep attacks
using IDS alerts. We consider the hidden states as similar phases of a particular type of …
using IDS alerts. We consider the hidden states as similar phases of a particular type of …
CyberSecurity attack prediction: a deep learning approach
Cybersecurity attacks are exponentially increasing, making existing detection mechanisms
insufficient and enhancing the necessity to design more relevant prediction models and …
insufficient and enhancing the necessity to design more relevant prediction models and …
Hidden markov model and cyber deception for the prevention of adversarial lateral movement
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …
nation-states and their associated entities, including private and corporate sectors. Cyber …
[PDF][PDF] Intrusion response systems: survey and taxonomy
This paper presents a taxonomy of intrusion response systems (IRS), classifying a number of
research papers published during the past decade that provide us with many valuable …
research papers published during the past decade that provide us with many valuable …
Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment
Cloud service availability has been one of the major concerns of cloud service providers
(CSP), while hosting different cloud based information technology services by managing …
(CSP), while hosting different cloud based information technology services by managing …
Taxonomy of intrusion risk assessment and response system
In recent years, we have seen notable changes in the way attackers infiltrate computer
systems compromising their functionality. Research in intrusion detection systems aims to …
systems compromising their functionality. Research in intrusion detection systems aims to …
Ban: Predicting apt attack based on bayesian network with mitre att&ck framework
Since cyberattacks have become sophisticated in the form of advanced persistent threats
(APTs), predicting and defending the APT attacks have drawn lots of attention. Although …
(APTs), predicting and defending the APT attacks have drawn lots of attention. Although …