Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery
Coexploitation behavior, referring to multiple software vulnerabilities being exploited jointly
by one or more exploits, brings enormous challenges to the prevention and remediation of …
by one or more exploits, brings enormous challenges to the prevention and remediation of …
A knowledge graph empowered online learning framework for access control decision-making
Abstract Knowledge graph, as an extension of graph data structure, is being used in a wide
range of areas as it can store interrelated data and reveal interlinked relationships between …
range of areas as it can store interrelated data and reveal interlinked relationships between …
Enhancing security in cloud computing using artificial intelligence (AI)
Cloud computing (CC) technologies (viz artificial intelligence (AI), data science,
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …
A compact vulnerability knowledge graph for risk assessment
Software vulnerabilities, also known as flaws, bugs or weaknesses, are common in modern
information systems, putting critical data of organizations and individuals at cyber risk. Due …
information systems, putting critical data of organizations and individuals at cyber risk. Due …
Graph intelligence enhanced bi-channel insider threat detection
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …
[HTML][HTML] Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities
This paper presents a reliability assessment technique for cyber-physical power systems
(CPPSs) that incorporates cybersecurity issues by considering non-normal random …
(CPPSs) that incorporates cybersecurity issues by considering non-normal random …
A survey on automated software vulnerability detection using machine learning and deep learning
Software vulnerability detection is critical in software security because it identifies potential
bugs in software systems, enabling immediate remediation and mitigation measures to be …
bugs in software systems, enabling immediate remediation and mitigation measures to be …
Real-time safety assessment for dynamic systems with limited memory and annotations
Z Liu, X He - IEEE Transactions on Intelligent Transportation …, 2023 - ieeexplore.ieee.org
Real-time safety assessment of dynamic systems has recently received increasing attention.
However, the performance of existing advanced approaches is often negatively affected by …
However, the performance of existing advanced approaches is often negatively affected by …
Elastic optimization for stragglers in edge federated learning
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …