Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The use of computational intelligence in intrusion detection systems: A review
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
Self-healing systems—survey and synthesis
As modern software-based systems and applications gain in versatility and functionality, the
ability to manage inconsistent resources and service disparate user requirements becomes …
ability to manage inconsistent resources and service disparate user requirements becomes …
A survey of clustering data mining techniques
P Berkhin - Grou** multidimensional data: Recent advances in …, 2006 - Springer
Clustering is the division of data into groups of similar objects. In clustering, some details are
disregarded in exchange for data simplification. Clustering can be viewed as a data …
disregarded in exchange for data simplification. Clustering can be viewed as a data …
[ספר][B] Computational intelligence: an introduction
AP Engelbrecht - 2007 - books.google.com
Computational Intelligence: An Introduction, Second Edition offers an in-depth exploration
into the adaptive mechanisms that enable intelligent behaviour in complex and changing …
into the adaptive mechanisms that enable intelligent behaviour in complex and changing …
A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns
G Creech, J Hu - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
Host-based anomaly intrusion detection system design is very challenging due to the
notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion …
notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion …
Generation of a new IDS test dataset: Time to retire the KDD collection
G Creech, J Hu - 2013 IEEE wireless communications and …, 2013 - ieeexplore.ieee.org
Intrusion detection systems are generally tested using datasets compiled at the end of last
century, justified by the need for publicly available test data and the lack of any other …
century, justified by the need for publicly available test data and the lack of any other …
Intrusion detection using sequences of system calls
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …
is given that short sequences of system calls executed by running processes are a good …
Use of k-nearest neighbor classifier for intrusion detection
Y Liao, VR Vemuri - Computers & security, 2002 - Elsevier
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify
program behavior as normal or intrusive. Program behavior, in turn, is represented by …
program behavior as normal or intrusive. Program behavior, in turn, is represented by …
Towards a taxonomy of intrusion-detection systems
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …
networks, or against information systems in general, as it is difficult to provide provably …
[ספר][B] Operating systems internals and design principles
W Stallings - 2009 - repositories.nust.edu.pk
OBJECTIVES This book is about the concepts, structure, and mechanisms of operating
systems. Its purpose is to present, as clearly and completely as possible, the nature and …
systems. Its purpose is to present, as clearly and completely as possible, the nature and …