Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital twin: A comprehensive survey of security threats
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …
process of finding the relationships between events is called correlation, which creates a …
[HTML][HTML] Secure cloud infrastructure: A survey on issues, current solutions, and open challenges
Cloud computing is currently becoming a well-known buzzword in which business titans,
such as Microsoft, Amazon, and Google, among others, are at the forefront in develo** …
such as Microsoft, Amazon, and Google, among others, are at the forefront in develo** …
Modeling and detection of the multi-stages of advanced persistent threats attacks based on semi-supervised learning and complex networks characteristics
Abstract Advanced Persistent Threats (APT) present the most sophisticated types of attacks
to modern networks which have proved to be very challenging to address. Using …
to modern networks which have proved to be very challenging to address. Using …
[HTML][HTML] Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
An evaluation framework for industrial control system cyber incidents
Industrial control systems (ICSs) and critical infrastructure are targeted by sophisticated
cyber incidents launched by skillful and persistent attackers. Due to political, public image …
cyber incidents launched by skillful and persistent attackers. Due to political, public image …
[HTML][HTML] Advanced persistent threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm
Abstract APT (Advanced Persistent Threat) is a complex type of attack that steals personal
data by staying in the infected system for a long time. When APT attacks take place in a …
data by staying in the infected system for a long time. When APT attacks take place in a …
Load balancing and server consolidation in cloud computing environments: a meta-study
The data-center is considered the heart of cloud computing. Recently, the growing demand
for cloud computing services has caused a growing load on data centers. In terms of system …
for cloud computing services has caused a growing load on data centers. In terms of system …
Security issues and defensive approaches in deep learning frameworks
H Chen, Y Zhang, Y Cao, J **e - Tsinghua Science and …, 2021 - ieeexplore.ieee.org
Deep learning frameworks promote the development of artificial intelligence and
demonstrate considerable potential in numerous applications. However, the security issues …
demonstrate considerable potential in numerous applications. However, the security issues …
APT-Dt-KC: advanced persistent threat detection based on kill-chain model
Advanced persistent threat attacks are considered as a serious risk to almost any
infrastructure since attackers are constantly changing and evolving their advanced …
infrastructure since attackers are constantly changing and evolving their advanced …