Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning and deep learning techniques for cybersecurity: a review
In this review, significant literature surveys on machine learning (ML) and deep learning
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …
A review on cyber security datasets for machine learning algorithms
O Yavanoglu, M Aydos - … conference on big data (big data), 2017 - ieeexplore.ieee.org
It is an undeniable fact that currently information is a pretty significant presence for all
companies or organizations. Therefore protecting its security is crucial and the security …
companies or organizations. Therefore protecting its security is crucial and the security …
Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT
The development of smart network infrastructure of the Internet of Things (IoT) faces the
immense threat of sophisticated Distributed Denial-of-Services (DDoS) security attacks. The …
immense threat of sophisticated Distributed Denial-of-Services (DDoS) security attacks. The …
An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey
In this research, we analyzed the suitability of each of the current state-of-the-art machine
learning models for various cyberattack detection from the past 5 years with a major …
learning models for various cyberattack detection from the past 5 years with a major …
Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks
Existing distributed denial-of-service attack detection in software defined networks (SDNs)
typically perform detection in a single domain. In reality, abnormal traffic usually affects …
typically perform detection in a single domain. In reality, abnormal traffic usually affects …
Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks
G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …
infrastructure, high speed in setting up the network, and no need for centralized …
SAD-IoT: Security analysis of DDoS attacks in IoT networks
P Kumar, H Bagga, BS Netam… - Wireless Personal …, 2022 - Springer
Internet of Things is one of the most versatile technologies in existence today. It has taken
over our day to day activities and thus has many applications that are designed to make life …
over our day to day activities and thus has many applications that are designed to make life …
Active learning to detect DDoS attack using ranked features
Network traffic classification to detect DDoS attacks is challenging in the context of high-
speed networks. In this paper, we discuss the need for distributed feature selection in …
speed networks. In this paper, we discuss the need for distributed feature selection in …
SmartDefense: A distributed deep defense against DDoS attacks with edge computing
The growing number of IoT edge devices have inflicted a change in the cyber-attack space.
The DDoS attacks, in particular, have significantly increased in magnitude and intensity. Of …
The DDoS attacks, in particular, have significantly increased in magnitude and intensity. Of …
Adaptive feature selection for denial of services (DoS) attack
Adaptive detection is the learning ability to detect any changes in patterns in intrusion
detection systems. In this paper, we propose combining two techniques in feature selection …
detection systems. In this paper, we propose combining two techniques in feature selection …