Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cybersecurity threats in FinTech: A systematic review
D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …
researchers and practitioners alike. The ever increasing sophistication of modern …
Challenges and pitfalls in malware research
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …
research questions arose, such as how to make malware research reproducible, how to …
[HTML][HTML] APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework
W Han, J Xue, Y Wang, F Zhang, X Gao - Information Sciences, 2021 - Elsevier
APT attacks have posed serious threats to the security of cyberspace nowadays which are
usually tailored for specific targets. Identification and understanding of APT attacks remains …
usually tailored for specific targets. Identification and understanding of APT attacks remains …
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …
OS events and on applying pattern matching procedures on binaries to detect malware. In …
CMD: Co-analyzed IoT malware detection and forensics via network and hardware domains
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …
a hot spot for both academic and industrial communities. Existing approaches can be …
Detection and classification of advanced persistent threats and attacks using the support vector machine
WL Chu, CJ Lin, KN Chang - Applied Sciences, 2019 - mdpi.com
Traditional network attack and hacking models are constantly evolving to keep pace with the
rapid development of network technology. Advanced persistent threat (APT), usually …
rapid development of network technology. Advanced persistent threat (APT), usually …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
Machine learning (in) security: A stream of problems
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …
Review of human decision-making during computer security incident analysis
We review practical advice on decision-making during computer security incident response.
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …