Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Ransomware detection using machine learning: A survey
A Alraizza, A Algarni - Big Data and Cognitive Computing, 2023 - mdpi.com
Ransomware attacks pose significant security threats to personal and corporate data and
information. The owners of computer-based resources suffer from verification and privacy …
information. The owners of computer-based resources suffer from verification and privacy …
A comprehensive survey for IoT security datasets taxonomy, classification and machine learning mechanisms
C Alex, G Creado, W Almobaideen, OA Alghanam… - Computers & …, 2023 - Elsevier
This survey paper compares existing IoT related datasets found in the literature with three
main objectives. The first one is to highlight the characteristics of these datasets such as the …
main objectives. The first one is to highlight the characteristics of these datasets such as the …
[HTML][HTML] Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …
healthcare, smart grids, and intelligent transportation systems necessitates robust security …
A fully privacy-preserving solution for anomaly detection in iot using federated learning and homomorphic encryption
Anomaly detection for the Internet of Things (IoT) is a very important topic in the context of
cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the …
cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the …
Deep learning-powered malware detection in cyberspace: a contemporary review
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …
aiming to provide insights into their relevance and contributions. The primary objective of the …
Enhancing ev charging station security using a multi-dimensional dataset: Cicevse2024
The rapid adoption of electric vehicles (EVs) is fundamentally transforming the automotive
industry, prompting a surge in the installation of charging stations to accommodate the …
industry, prompting a surge in the installation of charging stations to accommodate the …
Device fingerprinting for cyber-physical systems: a survey
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …
technologies raises device security and monitoring concerns. For device identification …
[HTML][HTML] Behavioral fingerprinting to detect ransomware in resource-constrained devices
Abstract The Internet of Things (IoT), a network of interconnected devices, has grown and
gained traction over the last few years. This paradigm can impact our lives while also …
gained traction over the last few years. This paradigm can impact our lives while also …
Transfer learning in pre-trained large language models for malware detection based on system calls
In the current cybersecurity landscape, protecting military devices such as communication
and battlefield management systems against sophisticated cyber attacks is crucial. Malware …
and battlefield management systems against sophisticated cyber attacks is crucial. Malware …
A comprehensive survey on hardware-assisted malware analysis and primitive techniques
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …
various domains such as smart cities, intelligent transportation, wireless sensor networks …