Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Detection of denial-of-service attacks based on computer vision techniques
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A
variety of detection systems has been proposed to achieve this task. Unlike the existing …
variety of detection systems has been proposed to achieve this task. Unlike the existing …
Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system
The utilization of conventional multivariate control chart in network intrusion detection will
deal with two main problems. First, the high false alarm occurs due to the distribution of …
deal with two main problems. First, the high false alarm occurs due to the distribution of …
The application of multivariate statistical process monitoring in non-industrial processes
Statistical process monitoring (SPM) techniques have been widely used in industry for many
decades in order to assess the process stability, as well as the final product quality …
decades in order to assess the process stability, as well as the final product quality …
Intrusion detection system for controller area network
V Tanksale - Cybersecurity, 2024 - Springer
The rapid expansion of intra-vehicle networks has increased the number of threats to such
networks. Most modern vehicles implement various physical and data-link layer …
networks. Most modern vehicles implement various physical and data-link layer …
Anomaly detection approaches for communication networks
In recent years, network anomaly detection has become an important area for both
commercial interests as well as academic research. Applications of anomaly detection …
commercial interests as well as academic research. Applications of anomaly detection …
Denial-of-service attack detection based on multivariate correlation analysis
The reliability and availability of network services are being threatened by the growing
number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection …
number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection …
Traffic anomaly detection in DDos flooding attack
Researches have been conducted to overcome Distributed Denial of Service (DDoS)
flooding attack. Beside the use of signature based detection, anomaly based detection is …
flooding attack. Beside the use of signature based detection, anomaly based detection is …
A new approach to dimensionality reduction for anomaly detection in data traffic
The monitoring and management of high-volume feature-rich traffic in large networks offers
significant challenges in storage, transmission, and computational costs. The predominant …
significant challenges in storage, transmission, and computational costs. The predominant …
Benford's law behavior of Internet traffic
L Arshadi, AH Jahangir - Journal of Network and Computer Applications, 2014 - Elsevier
In this paper, we analyze the Internet traffic from a different point of view based on Benford's
law, an empirical law that describes the distribution of leading digits in a collection of …
law, an empirical law that describes the distribution of leading digits in a collection of …
Anomaly detection for controller area networks using long short-term memory
V Tanksale - IEEE Open Journal of Intelligent Transportation …, 2020 - ieeexplore.ieee.org
The rapid expansion of intra-vehicle networks has increased the number of threats to such
networks. Most modern vehicles implement various physical and data-link layer …
networks. Most modern vehicles implement various physical and data-link layer …