Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …
technology in the manufacturing sector with consideration for offensive and defensive uses …
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical …
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
A survey of random forest based methods for intrusion detection systems
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …
approaches to deal with the increasing number and complexity of threats for computer …
Review on security of internet of things authentication mechanism
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
[HTML][HTML] Safety, security and privacy in machine learning based internet of things
Recent developments in communication and information technologies, especially in the
internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the …
internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the …
{HorusEye}: A realtime {IoT} malicious traffic detection framework using programmable switches
The ever-growing volume of IoT traffic brings challenges to IoT anomaly detection systems.
Existing anomaly detection systems perform all traffic detection on the control plane, which …
Existing anomaly detection systems perform all traffic detection on the control plane, which …
Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks
Open wireless sensor networks (WSNs) in Internet of things (IoT) has led to many zero-day
security attacks. Since intrusion detection is a key security solution, this paper presents a …
security attacks. Since intrusion detection is a key security solution, this paper presents a …
[HTML][HTML] An unsupervised TinyML approach applied to the detection of urban noise anomalies under the smart cities environment
Abstract Artificial Intelligence of Things (AIoT) is an emerging area of interest, and this can
be used to obtain knowledge and take better decisions in the same Internet of Things (IoT) …
be used to obtain knowledge and take better decisions in the same Internet of Things (IoT) …
[HTML][HTML] Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices
Undoubtedly, modern human digital lives are every day more and more connected, and the
revolution of “everything connected” is already becoming a reality. Indeed, humans live in …
revolution of “everything connected” is already becoming a reality. Indeed, humans live in …
Rule generation for signature based detection systems of cyber attacks in iot environments
Many modern attacks are targeting the IoT devices in recent year. Most of IoT attacks are
botnet attacks. Even though there are many detections and preventing systems for cyber …
botnet attacks. Even though there are many detections and preventing systems for cyber …