Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
ALSNAP: Attention-based long and short-period network security situation prediction
D Zhao, P Shen, S Zeng - Ad Hoc Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) and other emerging communication and network
technologies enable improved efficiency, convenience, and connectivity in various domains …
technologies enable improved efficiency, convenience, and connectivity in various domains …
RNNIDS: Enhancing network intrusion detection systems through deep learning
Security of information passing through the Internet is threatened by today's most advanced
malware ranging from orchestrated botnets to simpler polymorphic worms. These threats, as …
malware ranging from orchestrated botnets to simpler polymorphic worms. These threats, as …
Context aware Markov chains models
For more than a century, Markov chain models have had a tremendous effect on research
and industry alike in various domains such as physics, chemistry, biology, and computer …
and industry alike in various domains such as physics, chemistry, biology, and computer …
[PDF][PDF] Recurrent neural networks for enhancement of signature-based network intrusion detection systems
Security of information passing through the Internet is threatened by today's most advanced
malware ranging from orchestrated botnets to much simpler polymorphic worms. These …
malware ranging from orchestrated botnets to much simpler polymorphic worms. These …
Bad data injection attack propagation in cyber-physical power delivery systems
V Chukwuka, YC Chen, S Grijalva… - 2018 Clemson …, 2018 - ieeexplore.ieee.org
The coupling between information, communication and computing elements with the
physical components of power systems introduces new cyber and cyber-physical security …
physical components of power systems introduces new cyber and cyber-physical security …
Predictions of network attacks in collaborative environment
This paper is a digest of the thesis on predicting cyber attacks in a collaborative
environment. While previous works mostly focused on predicting attacks as seen from a …
environment. While previous works mostly focused on predicting attacks as seen from a …
Machine Learning-based Approach for Enhancing Multi-step Attack Prediction
Y Li, W Fan, R Luo - 2023 24st Asia-Pacific Network Operations …, 2023 - ieeexplore.ieee.org
Attack prediction is an advanced and crucial technology that enables response proactively
for defending against impending attacks before compromising the target. Currently, most …
for defending against impending attacks before compromising the target. Currently, most …
Data Analytics of a Honeypot System Based on a Markov Decision Process Model
L Wang, R Jones, TC Falls - Recent Trends and Advances in Model Based …, 2022 - Springer
A honeypot system can play a significant role in exposing cybercrimes and maintaining
reliable cybersecurity. Markov decision process (MDP) is an important method in systems …
reliable cybersecurity. Markov decision process (MDP) is an important method in systems …
Research of Information Propagation Path and Distribution of Vulnerable Points Based on Class Cooperative Network
X Zhao, X Hou, J Xue, H Xu, L You… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
With rapid growth in the size of software, applications' code structure becomes more
complex, attacks against vulnerable points can cause huge damage. To solve this problem …
complex, attacks against vulnerable points can cause huge damage. To solve this problem …