Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of DDoS attacking techniques and defence mechanisms in the IoT network
R Vishwakarma, AK Jain - Telecommunication systems, 2020 - Springer
Internet-of-things has emerged out as an important invention towards employing the
tremendous power of wireless media in the real world. We can control our surroundings by …
tremendous power of wireless media in the real world. We can control our surroundings by …
Mitigating network attacks using automatic signature generation
R Tzadikario - US Patent 7,540,025, 2009 - Google Patents
US PATENT DOCUMENTS A computer-implemented method for mitigating attacks of
5,067,074 A 1 1/1991 Farel et al. malicious traffic in a computer network includes receiving a …
5,067,074 A 1 1/1991 Farel et al. malicious traffic in a computer network includes receiving a …
System and method for providing network level and nodal level vulnerability protection in voip networks
S Kurapati, SP Joglekar, VI Prasanna, S Tyagi… - US Patent …, 2013 - Google Patents
6,633,835 B1 10/2003 Moran etal. 6,665,293 B2 12/2003 Thornton et a1. 6,757,823 B1
6/2004 Rao et al. 6,769,016 B2 7/2004 RothWellet a1. 6,781,955 B2 8/2004 Leung …
6/2004 Rao et al. 6,769,016 B2 7/2004 RothWellet a1. 6,781,955 B2 8/2004 Leung …
System and method for preventing data loss using virtual machine wrapped applications
S Agarwal, LCL Tarbotton - US Patent 9,552,497, 2017 - Google Patents
A method in one example implementation includes selecting at least one criterion for
controlling data transmission from within a virtual machine. At least one application is …
controlling data transmission from within a virtual machine. At least one application is …
Heuristic detection of malicious computer code by page tracking
P Szor - US Patent 7,418,729, 2008 - Google Patents
To detect a computer virus in a host file (100), an emulating module (414) emulates the host
file (100) in a virtual machine (422) having a virtual memory (426). While emulating the host …
file (100) in a virtual machine (422) having a virtual memory (426). While emulating the host …
Dynamic network protection
A Chesla, L Medvedovsky, A Elboim - US Patent 7,681,235, 2010 - Google Patents
US7681235B2 - Dynamic network protection - Google Patents US7681235B2 - Dynamic
network protection - Google Patents Dynamic network protection Download PDF Info Publication …
network protection - Google Patents Dynamic network protection Download PDF Info Publication …
Detecting and protecting against worm traffic on a network
AB Bar, D Touitou, R Rivlin - US Patent 8,438,241, 2013 - Google Patents
(57) ABSTRACT A method for processing communication traffic includes monitoring the
communication traffic that is directed to a group of addresses on a network, and determining …
communication traffic that is directed to a group of addresses on a network, and determining …
Method, apparatus and sofware for network traffic management
J Brendel - US Patent App. 10/499,766, 2005 - Google Patents
(57) ABSTRACT A network traffic evaluation device is provided that may be used to warn of
or prevent trafficabnormalities Such as denial of Service attacks. The device includes a data …
or prevent trafficabnormalities Such as denial of Service attacks. The device includes a data …
Method and apparatus for capturing and filtering datagrams for network security monitoring
JW O'Toole Jr - US Patent 7,467,408, 2008 - Google Patents
Current network security technology does not provide comprehensive protection for
computer networks. For example, neither the no-default-routes and restrictive gate ways …
computer networks. For example, neither the no-default-routes and restrictive gate ways …
Mitigating denial of service attacks
Service attacks, Such as denial of Service and distributed denial of Service attacks, of a
customer network are detected and Subsequently mitigated by the Internet Service Provider …
customer network are detected and Subsequently mitigated by the Internet Service Provider …