Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Ensemble based collaborative and distributed intrusion detection systems: A survey
Modern network intrusion detection systems must be able to handle large and fast changing
data, often also taking into account real-time requirements. Ensemble-based data mining …
data, often also taking into account real-time requirements. Ensemble-based data mining …
Pattern recognition systems under attack: Design issues and research challenges
We analyze the problem of designing pattern recognition systems in adversarial settings,
under an engineering viewpoint, motivated by their increasing exploitation in security …
under an engineering viewpoint, motivated by their increasing exploitation in security …
Poisoning behavioral malware clustering
Clustering algorithms have become a popular tool in computer security to analyze the
behavior of malware variants, identify novel malware families, and generate signatures for …
behavior of malware variants, identify novel malware families, and generate signatures for …
Is data clustering in adversarial settings secure?
Clustering algorithms have been increasingly adopted in security applications to spot
dangerous or illicit activities. However, they have not been originally devised to deal with …
dangerous or illicit activities. However, they have not been originally devised to deal with …
{ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates
In this paper, we present ExecScent, a novel system that aims to mine new, previously
unknown C&C domain names from live enterprise network traffic. ExecScent automatically …
unknown C&C domain names from live enterprise network traffic. ExecScent automatically …
On the use of artificial malicious patterns for android malware detection
Malware programs currently represent the most serious threat to computer information
systems. Despite the performed efforts of researchers in this field, detection tools still have …
systems. Despite the performed efforts of researchers in this field, detection tools still have …
Large-scale identification of malicious singleton files
We study a dataset of billions of program binary files that appeared on 100 million
computers over the course of 12 months, discovering that 94% of these files were present on …
computers over the course of 12 months, discovering that 94% of these files were present on …
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
We present DECANTeR, a system to detect anomalous outbound HTTP communication,
which passively extracts fingerprints for each application running on a monitored host. The …
which passively extracts fingerprints for each application running on a monitored host. The …
Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network
Ever growing Internet causes the availability of information. However, it also provides a
suitable space for malicious activities, so security is crucial in this virtual environment. The …
suitable space for malicious activities, so security is crucial in this virtual environment. The …
Poisoning complete-linkage hierarchical clustering
Clustering algorithms are largely adopted in security applications as a vehicle to detect
malicious activities, although few attention has been paid on preventing deliberate attacks …
malicious activities, although few attention has been paid on preventing deliberate attacks …