Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
K-means and alternative clustering methods in modern power systems
As power systems evolve by integrating renewable energy sources, distributed generation,
and electric vehicles, the complexity of managing these systems increases. With the …
and electric vehicles, the complexity of managing these systems increases. With the …
A review on feature selection in mobile malware detection
The widespread use of mobile devices in comparison to personal computers has led to a
new era of information exchange. The purchase trends of personal computers have started …
new era of information exchange. The purchase trends of personal computers have started …
MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles
Modern vehicles, including connected vehicles and autonomous vehicles, nowadays
involve many electronic control units connected through intravehicle networks (IVNs) to …
involve many electronic control units connected through intravehicle networks (IVNs) to …
Recurrent neural network model for IoT and networking malware threat detection
Security of networking in cyber-physical systems is an important feature in recent computing.
Information that comes to the network needs preevaluation. Our solution presented in this …
Information that comes to the network needs preevaluation. Our solution presented in this …
Constructing features for detecting android malicious applications: issues, taxonomy and directions
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …
A three-step machine learning framework for energy profiling, activity state prediction and production estimation in smart process manufacturing
The dynamic nature of chemical processes and manufacturing environments, along with
numerous machines, their unique activity states, and mutual interactions, render challenges …
numerous machines, their unique activity states, and mutual interactions, render challenges …
Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
[BOK][B] Machine learning approaches in cyber security analytics
T Thomas, AP Vijayaraghavan, S Emmanuel - 2019 - Springer
This book introduces various machine learning methods for cyber security analytics. With an
overwhelming amount of data being generated and transferred over various networks …
overwhelming amount of data being generated and transferred over various networks …
Hms-ids: Threat intelligence integration for zero-day exploits and advanced persistent threats in iiot
Abstract Critical Industries such as Manufacturing, Power, and Intelligent Transportation are
increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter …
increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter …
An end-to-end lower limb activity recognition framework based on sEMG data augmentation and enhanced CapsNet
C Zhang, Y Li, Z Yu, X Huang, J Xu, C Deng - Expert Systems with …, 2023 - Elsevier
Recently, lower limb activity recognition (LLAR) based on surface electromyography (sEMG)
signal has attracted increasing attention, mainly due to its applications in the control of …
signal has attracted increasing attention, mainly due to its applications in the control of …