Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Malware detection using honeypot and machine learning
Malware is one of the threats to information security that continues to increase. In 2014
nearly six million new malware was recorded. The highest number of malware is in Trojan …
nearly six million new malware was recorded. The highest number of malware is in Trojan …
A smart agent design for cyber security based on honeypot and machine learning
The development of Internet and social media contributes to multiplying the data produced
on the Internet and the connected nodes, but the default installation and the configuration of …
on the Internet and the connected nodes, but the default installation and the configuration of …
Remediation for ransomware attacks on cloud drive folders
E Iwanir, C Lahav, G Tamir - US Patent 10,715,533, 2020 - Google Patents
A system for detecting by a cloud service a ransomware attack on a client device is provided.
The system monitors changes to files of the client device that are stored by the cloud service …
The system monitors changes to files of the client device that are stored by the cloud service …
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
We are witnessing the advent of personal manufacturing, where home users and small and
medium enterprises manufacture products locally, at the point and time of need. The …
medium enterprises manufacture products locally, at the point and time of need. The …
Performance analysis of honeypots against flooding attack
V Mahajan, J Singh - 2022 6th International Conference on …, 2022 - ieeexplore.ieee.org
Internet security is of the utmost importance to both consumers and organizations due to the
massive risk of attack by malicious hackers. In order to increase internet security …
massive risk of attack by malicious hackers. In order to increase internet security …
Creation and integration of remote high interaction honeypots
M Valicek, G Schramm, M Pirker… - … on Software Security …, 2017 - ieeexplore.ieee.org
The internet connects an uncountable number of users and their devices, no one has a
global overview anymore. This state of constant chaos poses the problem of detecting novel …
global overview anymore. This state of constant chaos poses the problem of detecting novel …
A Step Towards Improvement in Classical Honeypot Security System
A Mudgal, S Bhatia - … on Machine Learning, Big Data, Cloud …, 2022 - ieeexplore.ieee.org
Data security is a vast term that doesn't have any limits, but there are a certain amount of
tools and techniques that could help in gaining security. Honeypot is among one of the tools …
tools and techniques that could help in gaining security. Honeypot is among one of the tools …
Modelling medical devices with honeypots
J Ihanus, T Kokkonen - Internet of Things, Smart Spaces, and Next …, 2020 - Springer
Cyber security is one of the key priorities in the modern digitalised and complex network
totality. One of the major domains of interest is the healthcare sector where a cyber incident …
totality. One of the major domains of interest is the healthcare sector where a cyber incident …
HoneyGAN Pots: A Deep Learning Approach for Generating Honeypots
R Gabrys, D Silva, M Bilinski - arxiv preprint arxiv:2407.07292, 2024 - arxiv.org
This paper investigates the feasibility and effectiveness of employing Generative Adversarial
Networks (GANs) for the generation of decoy configurations in the field of cyber defense …
Networks (GANs) for the generation of decoy configurations in the field of cyber defense …
Comparitive study of various honeypot tools on the basis of their classification & features
A Tiwari, D Kumar - … of the International Conference on Innovative …, 2020 - papers.ssrn.com
According to my opinion honeypots are proved to be a gear system to our network security.
During the past few years, this technology still acts as a shield to protect our systems …
During the past few years, this technology still acts as a shield to protect our systems …