Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber threat intelligence on blockchain: A systematic literature review
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
Helphed: Hybrid ensemble learning phishing email detection
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …
companies in this area face several challenges, such as a lack of data, a shortage of …
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …
finance, and cybersecurity has simultaneously exposed these systems to unique …
A Bring Your Own Device security awareness survey among professionals
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …
posed significant challenges to organizations in terms of security and management. This …
Event-Based Threat Intelligence Ontology Model
P Wang, G Dai, L Zhai - International Conference on Science of Cyber …, 2023 - Springer
Abstract Cyber Threat Intelligence (CTI) has become an essential part of contemporary
threat detection and response solutions. However, threat intelligence is facing challenges …
threat detection and response solutions. However, threat intelligence is facing challenges …
NITRO: an Interconnected 5G-IoT Cyber Range
This paper presents NITRO cyber range, which aims at creating a specialized cybersecurity
testing and training environment for 5G and IoT networks. NITRO provides a platform for …
testing and training environment for 5G and IoT networks. NITRO provides a platform for …
Navigating the waters of maritime cybersecurity with BIMCO's guidelines: identifying vulnerabilities and mitigating threats to IT and OT systems
G Kalogeras - 2023 - dione.lib.unipi.gr
IT systems in vessels used in the marine sector, incorporating guidelines and methodologies
from BIMCO in the review process. This study comprises a review of possible cybersecurity …
from BIMCO in the review process. This study comprises a review of possible cybersecurity …
Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance
A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …
cyber threats, has elevated the importance of robust cybersecurity measures. This …
Analytical study for cyber threat intelligence (CTI)
IR Alkhateeb, QA Al-Haija, S Abu-Soud - IET Conference Proceedings CP859, 2023 - IET
Cyber Threat Intelligence (CTI) involves collecting and analyzing cyber security data using
advanced algorithms and rigorous techniques to identify and address potential threats …
advanced algorithms and rigorous techniques to identify and address potential threats …