Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
AI-enabled IoT penetration testing: state-of-the-art and research challenges
ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …
An analysis on financial statement fraud detection for Chinese listed companies using deep learning
W **uguo, D Shengyong - Ieee Access, 2022 - ieeexplore.ieee.org
Financial fraud has extremely damaged the sustainable growth of financial markets as a
serious problem worldwide. Nevertheless, it is fairly challenging to identify frauds with highly …
serious problem worldwide. Nevertheless, it is fairly challenging to identify frauds with highly …
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning
J Chen, S Hu, H Zheng, C **ng, G Zhang - Computers & Security, 2023 - Elsevier
Penetration testing (PT) is an efficient tool for network testing and vulnerability mining by
simulating the hackers' attacks to obtain valuable information applied in operating and …
simulating the hackers' attacks to obtain valuable information applied in operating and …
Cygil: A cyber gym for training autonomous agents over emulated network systems
L Li, R Fayad, A Taylor - arxiv preprint arxiv:2109.03331, 2021 - arxiv.org
Given the success of reinforcement learning (RL) in various domains, it is promising to
explore the application of its methods to the development of intelligent and autonomous …
explore the application of its methods to the development of intelligent and autonomous …
Enhancing Intrusion Detection Systems with Reinforcement Learning: A Comprehensive Survey of RL-based Approaches and Techniques
Intrusion detection systems (IDSs) play a crucial role in network security, as the need for
secure networks continues to grow. However, traditional IDSs are not able to accurately and …
secure networks continues to grow. However, traditional IDSs are not able to accurately and …
[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
In this paper, we propose a formalization of the process of exploitation of SQL injection
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …
Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge
Penetration testing is a security exercise aimed at assessing the security of a system by
simulating attacks against it. So far, penetration testing has been carried out mainly by …
simulating attacks against it. So far, penetration testing has been carried out mainly by …
Research and challenges of reinforcement learning in cyber defense decision-making for intranet security
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …
characteristics, which pose significant challenges to cyber defense decision-making on …
The Agent Web Model: modeling web hacking for reinforcement learning
Website hacking is a frequent attack type used by malicious actors to obtain confidential
information, modify the integrity of web pages or make websites unavailable. The tools used …
information, modify the integrity of web pages or make websites unavailable. The tools used …
Distributed web hacking by adaptive consensus-based reinforcement learning
In this paper, we propose a novel adaptive consensus-based learning algorithm for
automated and distributed web hacking. We aim to assist ethical hackers in conducting …
automated and distributed web hacking. We aim to assist ethical hackers in conducting …