Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Ransomware: Recent advances, analysis, challenges and future research directions
C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …
Different institutions such as healthcare, financial, and government have been targeted …
A survey of outlier detection in high dimensional data streams
The rapid evolution of technology has led to the generation of high dimensional data
streams in a wide range of fields, such as genomics, signal processing, and finance. The …
streams in a wide range of fields, such as genomics, signal processing, and finance. The …
Intrusion detection based on autoencoder and isolation forest in fog computing
Fog Computing has emerged as an extension to cloud computing by providing an efficient
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …
A survey of techniques for mobile service encrypted traffic classification using deep learning
The rapid adoption of mobile devices has dramatically changed the access to various
networking services and led to the explosion of mobile service traffic. Mobile service traffic …
networking services and led to the explosion of mobile service traffic. Mobile service traffic …
Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges
I Kara - Expert Systems with Applications, 2023 - Elsevier
The rapid advancements in cyber-attack strategies are in parallel with the measures for
detection, analysis, and prevention. Attackers have recently developed fileless malware that …
detection, analysis, and prevention. Attackers have recently developed fileless malware that …
Intrusion detection based on bidirectional long short-term memory with attention mechanism
With the recent developments in the Internet of Things (IoT), the amount of data collected
has expanded tremendously, resulting in a higher demand for data storage, computational …
has expanded tremendously, resulting in a higher demand for data storage, computational …
Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and
optimizing healthcare by delivering new ways to monitor, diagnose and treat patients …
optimizing healthcare by delivering new ways to monitor, diagnose and treat patients …
Preparing network intrusion detection deep learning models with minimal data using adversarial domain adaptation
Recent work has shown that deep learning (DL) techniques are highly effective for assisting
network intrusion detection systems (NIDS) in identifying malicious attacks on networks …
network intrusion detection systems (NIDS) in identifying malicious attacks on networks …
Overcoming the lack of labeled data: Training intrusion detection models using transfer learning
Deep learning (DL) techniques have recently been proposed for enhancing the accuracy of
network intrusion detection systems (NIDS). However, kee** the DL based detection …
network intrusion detection systems (NIDS). However, kee** the DL based detection …
Network intrusion detection using clustering and gradient boosting
P Verma, S Anwar, S Khan… - 2018 9th International …, 2018 - ieeexplore.ieee.org
An unauthorized activity on the network is called network intrusion and device or software
application which monitors the network parameters in order to detect such an intrusion is …
application which monitors the network parameters in order to detect such an intrusion is …