Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A machine learning approach for corrosion small datasets
In this work, we developed a QSAR model using the K-Nearest Neighbor (KNN) algorithm to
predict the corrosion inhibition performance of the inhibitor compound. To overcome the …
predict the corrosion inhibition performance of the inhibitor compound. To overcome the …
[HTML][HTML] Toward efficient intrusion detection system using hybrid deep learning approach
A Aldallal - Symmetry, 2022 - mdpi.com
The increased adoption of cloud computing resources produces major loopholes in cloud
computing for cybersecurity attacks. An intrusion detection system (IDS) is one of the vital …
computing for cybersecurity attacks. An intrusion detection system (IDS) is one of the vital …
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and
online shop**. Several techniques compromise Internet security, including hacking, SQL …
online shop**. Several techniques compromise Internet security, including hacking, SQL …
A boosting-based hybrid feature selection and multi-layer stacked ensemble learning model to detect phishing websites
Phishing is a type of online scam where the attacker tries to trick you into giving away your
personal information, such as passwords or credit card details, by posing as a trustworthy …
personal information, such as passwords or credit card details, by posing as a trustworthy …
A comparative analysis of feature eliminator methods to improve machine learning phishing detection
This Machine-learning-based phishing detection employs statistical models and algorithms
to assess and recognise phishing attacks. These algorithms can learn patterns and features …
to assess and recognise phishing attacks. These algorithms can learn patterns and features …
[HTML][HTML] An explainable feature selection framework for web phishing detection with machine learning
SS Shafin - Data Science and Management, 2024 - Elsevier
In the evolving landscape of cyber threats, phishing attacks pose significant challenges,
particularly through deceptive webpages designed to extract sensitive information under the …
particularly through deceptive webpages designed to extract sensitive information under the …
Feature selection to enhance phishing website detection based on url using machine learning techniques
The detection of phishing websites based on machine learning has gained much attention
due to its ability to detect newly generated phishing URLs. To detect phishing websites, most …
due to its ability to detect newly generated phishing URLs. To detect phishing websites, most …
A Comprehensive Survey: Exploring Current Trends and Challenges in Intrusion Detection and Prevention Systems in the Cloud Computing Paradigm
The rapid evolution of internet technologies has led to a significant proliferation of connected
devices, expanding the potential attack surface. This necessitates the implementation of …
devices, expanding the potential attack surface. This necessitates the implementation of …
[HTML][HTML] A novel logo identification technique for logo-based phishing detection in cyber-physical systems
The first and foremost task of a phishing-detection mechanism is to confirm the appearance
of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL …
of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL …
[HTML][HTML] Practical classification accuracy of sequential data using neural networks
M Mimura - Machine Learning with Applications, 2025 - Elsevier
Many existing studies on neural network accuracy utilize datasets that may not always reflect
real-world conditions. While it has been demonstrated that accuracy tends to decrease as …
real-world conditions. While it has been demonstrated that accuracy tends to decrease as …