Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …
necessity to help safeguard personal and organizational assets. However, with the …
The use of artificial intelligence based techniques for intrusion detection: a review
The Internet connects hundreds of millions of computers across the world running on
multiple hardware and software platforms providing communication and commercial …
multiple hardware and software platforms providing communication and commercial …
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
S Aljawarneh, M Aldwairi, MB Yassein - Journal of Computational Science, 2018 - Elsevier
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …
means that one has to collect large amounts of network transactions including high details of …
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - journals.sagepub.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …
is given that short sequences of system calls executed by running processes are a good …
Distributed intrusion detection system in a multi-layer network architecture of smart grids
The advent of the smart grid promises to usher in an era that will bring intelligence,
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …
Architecture for an artificial immune system
SA Hofmeyr, S Forrest - Evolutionary computation, 2000 - ieeexplore.ieee.org
An artificial immune system (ARTIS) is described which incorporates many properties of
natural immune systems, including diversity, distributed computation, error tolerance …
natural immune systems, including diversity, distributed computation, error tolerance …
[PDF][PDF] EMERALD: Event monitoring enabling response to anomalous live disturbances
PA Porras, PG Neumann - Proceedings of the 20th national information …, 1997 - csrc.nist.gov
The EMERALD (Event Monitori ng Enabli ng Responses to Anomal ous Li ve Di sturbances)
envi ronment isa di stri buted scal abl e tool sui te for tracki ng mal i ci ous acti vi tythrough …
envi ronment isa di stri buted scal abl e tool sui te for tracki ng mal i ci ous acti vi tythrough …
Intrusion detection using an ensemble of intelligent paradigms
Soft computing techniques are increasingly being used for problem solving. This paper
addresses using an ensemble approach of different soft computing and hard computing …
addresses using an ensemble approach of different soft computing and hard computing …
Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm
Rapid development of technologies not only makes life easier, but also reveals a lot of
security problems. Develo** and changing of attack types affect many people …
security problems. Develo** and changing of attack types affect many people …
An architecture for intrusion detection using autonomous agents
JS Balasubramaniyan… - … conference (Cat. No …, 1998 - ieeexplore.ieee.org
The intrusion detection system architectures commonly used in commercial and research
systems have a number of problems that limit their configurability, scalability or efficiency …
systems have a number of problems that limit their configurability, scalability or efficiency …