Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review for network intrusion detection system (IDS)
OH Abdulganiyu, T Ait Tchakoucht… - International journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …
individual and corporate data passing through internet has increasingly grown. With gaps in …
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
Water quality prediction using machine learning models based on grid search method
Water quality is very dominant for humans, animals, plants, industries, and the environment.
In the last decades, the quality of water has been impacted by contamination and pollution …
In the last decades, the quality of water has been impacted by contamination and pollution …
Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset
AR Gad, AA Nashat, TM Barkat - IEEE access, 2021 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are a subsystem of the proposed intelligent
transportation system (ITS) that enables vehicles to communicate over the wireless …
transportation system (ITS) that enables vehicles to communicate over the wireless …
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection
H Ding, L Chen, L Dong, Z Fu, X Cui - Future Generation Computer Systems, 2022 - Elsevier
With the continuous emergence of various network attacks, it is becoming more and more
important to ensure the security of the network. Intrusion detection, as one of the important …
important to ensure the security of the network. Intrusion detection, as one of the important …
[HTML][HTML] Ensemble learning methods using the Hodrick–Prescott filter for fault forecasting in insulators of the electrical power grids
Electrical power grid insulators installed outdoors are exposed to environmental conditions,
such as the accumulation of contaminants on their surface. The contaminants increase the …
such as the accumulation of contaminants on their surface. The contaminants increase the …
[HTML][HTML] A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Abstract Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due
to insecure wireless communication, resource constraint architecture, different types of IoT …
to insecure wireless communication, resource constraint architecture, different types of IoT …
[HTML][HTML] Botnet attack detection using local global best bat algorithm for industrial internet of things
The need for timely identification of Distributed Denial-of-Service (DDoS) attacks in the
Internet of Things (IoT) has become critical in minimizing security risks as the number of IoT …
Internet of Things (IoT) has become critical in minimizing security risks as the number of IoT …
Towards an efficient model for network intrusion detection system (IDS): systematic literature review
With the recent rise in internet usage, the volume of crucial, private, and confidential data
traveling online has increased. Attackers have made attempts to break into the network due …
traveling online has increased. Attackers have made attempts to break into the network due …
TMG-GAN: Generative adversarial networks-based imbalanced learning for network intrusion detection
H Ding, Y Sun, N Huang, Z Shen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) devices are large in number, widely distributed, weak in protection
ability, and vulnerable to various malicious attacks. Intrusion detection technology can …
ability, and vulnerable to various malicious attacks. Intrusion detection technology can …