Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic and critical review of rsa based public key cryptographic schemes: Past and present status
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …
unauthorized access. Advancement in technologies and new innovative methods applied by …
Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research
Supervised learning and pattern recognition is a crucial area of research in information
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …
[HTML][HTML] Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection
M Schmitt - Journal of Industrial Information Integration, 2023 - Elsevier
The last decades have been characterized by unprecedented technological advances,
many of them powered by modern technologies such as Artificial Intelligence (AI) and …
many of them powered by modern technologies such as Artificial Intelligence (AI) and …
Cybersecurity risk assessment in smart city infrastructures
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …
Integration and applications of fog computing and cloud computing based on the internet of things for provision of healthcare services at home
Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase
of the rate of morbidity and mortality among people, particularly the elderly aged patients …
of the rate of morbidity and mortality among people, particularly the elderly aged patients …
[HTML][HTML] Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms
A Sharma, UK Singh - Global Transitions Proceedings, 2022 - Elsevier
Major backbone of today's competitive and upcoming market is definitely becoming Cloud
computing & hence corporate utilize capabilities of cloud computing services. To improve …
computing & hence corporate utilize capabilities of cloud computing services. To improve …
[HTML][HTML] Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder
Software-defined networking (SDN) is an innovative network paradigm, offering substantial
control of network operation through a network's architecture. SDN is an ideal platform for …
control of network operation through a network's architecture. SDN is an ideal platform for …
Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment
J Crotty, E Daniel - Applied Computing and Informatics, 2022 - emerald.com
Purpose Consumers increasingly rely on organisations for online services and data storage
while these same institutions seek to digitise the information assets they hold to create …
while these same institutions seek to digitise the information assets they hold to create …
Explainable artificial intelligence enabled intrusion detection technique for secure cyber-physical systems
A cyber-physical system (CPS) can be referred to as a network of cyber and physical
components that communicate with each other in a feedback manner. A CPS is essential for …
components that communicate with each other in a feedback manner. A CPS is essential for …
[HTML][HTML] Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy
S Mishra - Electronics, 2023 - mdpi.com
The cyberspace is a convenient platform for creative, intellectual, and accessible works that
provide a medium for expression and communication. Malware, phishing, ransomware, and …
provide a medium for expression and communication. Malware, phishing, ransomware, and …