Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Automated behavioral analysis of malware: A case study of wannacry ransomware
Q Chen, RA Bridges - 2017 16th IEEE International Conference …, 2017 - ieeexplore.ieee.org
Ransomware, a class of self-propagating malware that uses encryption to hold the victims'
data ransom, has emerged in recent years as one of the most dangerous cyber threats, with …
data ransom, has emerged in recent years as one of the most dangerous cyber threats, with …
Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network
The backbone of the economy, security and sustainability of a state is inseparably linked to
the security of its critical infrastructure. Critical infrastructures define goods, systems or …
the security of its critical infrastructure. Critical infrastructures define goods, systems or …
A spiking one-class anomaly detection framework for cyber-security on industrial control systems
K Demertzis, L Iliadis, S Spartalis - … 2017, Athens, Greece, August 25–27 …, 2017 - Springer
Developments and upgrades in the field of industrial information technology, particularly
those relating to information systems' technologies for the collection and processing of real …
those relating to information systems' technologies for the collection and processing of real …
An internal intrusion detection and protection system by using data mining and forensic techniques
Currently, most computer systems use user IDs and passwords as the login patterns to
authenticate users. However, many people share their login patterns with coworkers and …
authenticate users. However, many people share their login patterns with coworkers and …
Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA
AS Desai, DP Gaikwad - 2016 IEEE international conference on …, 2016 - ieeexplore.ieee.org
In Internet-based communication, different types of networks are used to provide services to
users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in …
users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in …
A computational intelligence system identifying cyber-attacks on smart energy grids
K Demertzis, L Iliadis - Modern discrete mathematics and analysis: with …, 2018 - Springer
According to the latest projections of the International Energy Agency, smart grid
technologies have become essential to handling the radical changes expected in …
technologies have become essential to handling the radical changes expected in …
DDoS attack volume forecasting using a statistical approach
D Kwon, H Kim, D An, H Ju - 2017 IFIP/IEEE Symposium on …, 2017 - ieeexplore.ieee.org
In this paper, we propose a proactive security method that estimates distributed denial of
service (DDoS) attack volume in order to overcome the limitation of the response time of …
service (DDoS) attack volume in order to overcome the limitation of the response time of …
[PDF][PDF] Cognitive web application firewall to critical infrastructures protection from phishing attacks
K Demertzis, L Iliadis - Journal of Computations & Modelling, 2019 - scienpress.com
Phishing scams and attacks attempt to trick people into providing sensitive personal
information such as account login credentials, credit card numbers, banking details and …
information such as account login credentials, credit card numbers, banking details and …
Towards autonomic security management of healthcare information systems
Q Chen, J Lambright… - 2016 IEEE First …, 2016 - ieeexplore.ieee.org
With the fast development of information and communication technologies over the past
decade, Healthcare Information Technology (HIT) has been widely implemented for health …
decade, Healthcare Information Technology (HIT) has been widely implemented for health …
Toward realizing self-protecting healthcare information systems: Design and security challenges
Q Chen - Advances in Computers, 2019 - Elsevier
This book chapter reviews the history of Healthcare Information Systems (HISs), discusses
recent cyber security threats affecting HISs, and then introduces the autonomic computing …
recent cyber security threats affecting HISs, and then introduces the autonomic computing …