Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Business email compromise phishing detection based on machine learning: A systematic literature review
HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …
[HTML][HTML] A hybrid methodology for anomaly detection in Cyber–Physical Systems
N Jeffrey, Q Tan, JR Villar - Neurocomputing, 2024 - Elsevier
The rapid adoption of Industry 4.0 has seen Information Technology (IT) networks
increasingly merged with Operational Technology (OT) networks, which have traditionally …
increasingly merged with Operational Technology (OT) networks, which have traditionally …
Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning
AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
Global supply chains security: a comparative analysis of emerging threats and traceability solutions
Purpose The purpose of this study is to increase awareness of current supply chain (SC)
security-related issues by providing an extensive analysis of existing SC security solutions …
security-related issues by providing an extensive analysis of existing SC security solutions …
A multilayer perceptron model for anomaly detection in water treatment plants
Early and accurate anomaly detection in critical infrastructure (CI), such as water treatment
plants and electric power grid, is necessary to avoid plant damage and service disruption …
plants and electric power grid, is necessary to avoid plant damage and service disruption …
A false sense of security? Revisiting the state of machine learning-based industrial intrusion detection
Anomaly-based intrusion detection promises to detect novel or unknown attacks on
industrial control systems by modeling expected system behavior and raising corresponding …
industrial control systems by modeling expected system behavior and raising corresponding …
Blending data and physics against false data injection attack: An event-triggered moving target defence approach
Fast and accurate detection of cyberattacks is a key element for a cyber-resilient power
system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) …
system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) …
A hybrid physics-based data-driven framework for anomaly detection in industrial control systems
A method referred to as PbNN is proposed to detect cyber-physical attacks through the
identification of resulting anomalies in the process dynamics of the underlying ICS. Unlike …
identification of resulting anomalies in the process dynamics of the underlying ICS. Unlike …
AI for cyberbiosecurity in water systems—A survey
Abstract The use of Artificial Intelligence (AI) is growing in areas where decisions and
consequences have high-stakes such as larger scale software, critical infrastructure, and …
consequences have high-stakes such as larger scale software, critical infrastructure, and …
High-fidelity cyber and physical simulation of water distribution systems. II: Enabling cyber-physical attack localization
A fundamental problem in the realm of cyber-physical security of smart water networks is
attack detection, a key step towards designing adequate countermeasures. This task is …
attack detection, a key step towards designing adequate countermeasures. This task is …