Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
Resilience analysis of cyber‐physical systems: A review of models and methods
Cyber‐physical systems (CPSs) are monitored and controlled by a computing and
communicating core. This cyber layer enables better management of the controlled …
communicating core. This cyber layer enables better management of the controlled …
Institutional strategies for cybersecurity in higher education institutions
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …
Big data for cybersecurity: Vulnerability disclosure trends and dependencies
MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …
targets by existing and emerging threat agents. Elaborate and specialised attacks will …
A deep learning framework for predicting cyber attacks rates
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …
threats can never be overestimated. Previous investigations show that cyber attack data …
Modeling and predicting cyber hacking breaches
M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …
of the evolution of the threat situation. This is a relatively new research topic, and many …
Stram: Measuring the trustworthiness of computer-based systems
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …
systems, such as dependability and security metrics for estimating their performance and …
Modeling multivariate cybersecurity risks
Modeling cybersecurity risks is an important, yet challenging, problem. In this paper, we
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …
A cyber security data triage operation retrieval system
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …
Modeling of intrusion and defense for assessment of cyber security at power substations
Cyber intrusions to substations are critical issues to a power grid, which must be defended
and mitigated. Essentially, to better understand a cyber intrusion, reconnaissance activities …
and mitigated. Essentially, to better understand a cyber intrusion, reconnaissance activities …