Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on network security-related data collection technologies
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities
have motivated intensive studies on network security. Normally, data collected in a network …
have motivated intensive studies on network security. Normally, data collected in a network …
[HTML][HTML] Adaptive security-related data collection with context awareness
H Lin, Z Yan, Y Fu - Journal of Network and Computer Applications, 2019 - Elsevier
The huge economic loss resulting from network attacks and intrusions has led to an
intensive study on network security. The network security is usually reflected by some …
intensive study on network security. The network security is usually reflected by some …
Consumption behavior analysis of over the top services: Incremental learning or traditional methods?
Network monitoring and analysis of consumption behavior are important aspects for network
operators. The information obtained about consumption trends allows to offer new data …
operators. The information obtained about consumption trends allows to offer new data …
Forensic content detection through power consumption
Digital forensic investigators are facing challenging problems of finding clues and solving
crimes involving digital data. Advanced metering devices (smart meters) are being installed …
crimes involving digital data. Advanced metering devices (smart meters) are being installed …
Specwatch: Adversarial spectrum usage monitoring in crns with unknown statistics
In cognitive radio networks (CRNs), dynamic spectrum access has been proposed to
improve the spectrum utilization, but it also generates spectrum misuse problems. One …
improve the spectrum utilization, but it also generates spectrum misuse problems. One …
SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics
In cognitive radio networks (CRNs), dynamic spectrum access has been proposed to
improve the spectrum utilization, but it also generates spectrum misuse problems. One …
improve the spectrum utilization, but it also generates spectrum misuse problems. One …
Redundant sniffer deployment for multi-channel wireless network forensics with unreliable conditions
Network forensics refers to monitoring and analysis of network traffic for the purpose of
information gathering, legal evidence, or intrusion detection. Wireless sniffers are usually …
information gathering, legal evidence, or intrusion detection. Wireless sniffers are usually …
Learning optimal sniffer channel assignment for small cell cognitive radio networks
To cope with the exploding mobile traffic in the fifth generation cellular network, the dense
deployment of small cells and cognitive radios are two key technologies that significantly …
deployment of small cells and cognitive radios are two key technologies that significantly …
Sentiment-analysis of review text for micro-video
Z Liu, N Yang, S Cao - 2016 2nd IEEE International Conference …, 2016 - ieeexplore.ieee.org
With the rapid development of big data technology, the application of online micro video has
been improved greatly. This paper provides a method of analyzing the sentiment of the …
been improved greatly. This paper provides a method of analyzing the sentiment of the …
Sniffer channel assignment with imperfect monitoring for cognitive radio networks
Sniffer channel assignment (SCA) is a fundamental building block for wireless data capture,
which is essential for traffic monitoring and network forensics. Most of the existing SCA …
which is essential for traffic monitoring and network forensics. Most of the existing SCA …