Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A Survey on the Applications of Semi-supervised Learning to Cyber-security
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …
The roadmap to 6G security and privacy
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …
visionaries of the 6th generation (6G) echo systems have already come into the discussion …
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
6G security challenges and potential solutions
Although the fifth generation wireless networks are yet to be fully investigated, the vision and
key elements of the 6th generation (6G) ecosystem have already come into discussion. In …
key elements of the 6th generation (6G) ecosystem have already come into discussion. In …
[HTML][HTML] Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience
PRJ Trim, YI Lee - Big Data and Cognitive Computing, 2022 - mdpi.com
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve
cyber security management, not all managers understand the different types of AI/ML and …
cyber security management, not all managers understand the different types of AI/ML and …
Cybert: Contextualized embeddings for the cybersecurity domain
We present CyBERT, a domain-specific Bidirectional Encoder Representations from
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …
Impacts and risk of generative AI technology on cyber defense
Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of
autonomously producing highly realistic content in various domains, such as text, images …
autonomously producing highly realistic content in various domains, such as text, images …
Creating cybersecurity knowledge graphs from malware after action reports
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …
knowledge from these sources would provide security analysts with credible information …
Generating fake cyber threat intelligence using transformer-based models
Cyber-defense systems are being developed to automatically ingest Cyber Threat
Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge …
Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge …
From European critical infrastructure protection to the resilience of European critical entities: what does it mean?
C Pursiainen, E Kytömaa - Sustainable and Resilient infrastructure, 2023 - Taylor & Francis
The article is a public policy analysis of the development of legislation on critical
infrastructure in the European Union (EU), covering 27 developed countries. More precisely …
infrastructure in the European Union (EU), covering 27 developed countries. More precisely …