Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Risk taxonomy, mitigation, and assessment benchmarks of large language model systems
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …
processing tasks. However, the safety and security issues of LLM systems have become the …
Aggregate-based congestion control for pulse-wave DDoS defense
Pulse-wave DDoS attacks are a new type of volumetric attack formed by short, high-rate
traffic pulses. Such attacks target the Achilles' heel of state-of-the-art DDoS defenses: their …
traffic pulses. Such attacks target the Achilles' heel of state-of-the-art DDoS defenses: their …
A stealthier partitioning attack against bitcoin peer-to-peer network
Network adversaries, such as malicious transit autonomous systems (ASes), have been
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …
An empirical study of consensus protocols' dos resilience
With the proliferation of blockchain technology in high-value sectors, consensus protocols
are becoming critical infrastructures. The rapid innovation cycle in Byzantine fault tolerant …
are becoming critical infrastructures. The rapid innovation cycle in Byzantine fault tolerant …
Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …
analyzing traffic features. However, existing services are unable to accurately detect …
Toposcope: Recover as relationships from fragmentary observations
Knowledge of the Internet topology and the business relationships between Autonomous
Systems (ASes) is the basis for studying many aspects of the Internet. Despite the significant …
Systems (ASes) is the basis for studying many aspects of the Internet. Despite the significant …
Differential pricing strategies for bandwidth allocation with LFA resilience: A stackelberg game approach
L **e, S Meng, W Yao, X Zhang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Link flooding attacks (LFAs) have always been a security concern as the impact of
volumetric attacks on transit links are increasingly severe. Capacity expansion, while being …
volumetric attacks on transit links are increasingly severe. Capacity expansion, while being …
Colibri: a cooperative lightweight inter-domain bandwidth-reservation infrastructure
Guarantees for traffic traversing the public Internet are hard to come by, as service-level
agreements are typically only available for traffic within a single autonomous system or …
agreements are typically only available for traffic within a single autonomous system or …
Off-path TCP hijacking attacks via the side channel of downgraded IPID
In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate
victim TCP connections or inject forged data into victim TCP connections by manipulating …
victim TCP connections or inject forged data into victim TCP connections by manipulating …
Rl-shield: mitigating target link-flooding attacks using sdn and deep reinforcement learning routing algorithm
A Rezapour, WG Tzeng - IEEE Transactions on Dependable …, 2021 - ieeexplore.ieee.org
Link-flooding attacks (LFAs) are a new type of distributed denial-of-service (DDoS) attacks
that can substantially damage network connectivity. LFAs flows are seemingly legitimate at …
that can substantially damage network connectivity. LFAs flows are seemingly legitimate at …