Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Analysis of IoT security challenges and its solutions using artificial intelligence
The Internet of Things (IoT) is a well-known technology that has a significant impact on many
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
[HTML][HTML] Internet of Things botnets: A survey on Artificial Intelligence based detection techniques
Abstract The Internet of Things (IoT) is a game changer when it comes to digitization across
industries. The Fourth Industrial Revolution (4IR), brought about a paradigm shift indeed …
industries. The Fourth Industrial Revolution (4IR), brought about a paradigm shift indeed …
A GNN-based adversarial internet of things malware detection framework for critical infrastructure: Studying gafgyt, mirai and tsunami campaigns
B Esmaeili, A Azmoodeh… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Significant advancement in deep learning (DL) has turned it into an integral part of robust
approaches for addressing cybersecurity problems in both current and aging infrastructures …
approaches for addressing cybersecurity problems in both current and aging infrastructures …
Hybrid Optimal Control for Malware Propagation in UAV-WSN System: A Stacking Ensemble Learning Control Algorithm
G Liu, J Zhang, X Zhong, X Hu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) and wireless sensor network (WSN) system widely used in
emergency sites monitoring, disaster relief and data collection, is vulnerable to malware …
emergency sites monitoring, disaster relief and data collection, is vulnerable to malware …
[HTML][HTML] Nettisa: Extended ip flow with time-series features for universal bandwidth-constrained high-speed network traffic classification
Network traffic monitoring based on IP Flows is a standard monitoring approach that can be
deployed to various network infrastructures, even the large ISP networks connecting millions …
deployed to various network infrastructures, even the large ISP networks connecting millions …
Explainable graph clustering via expanders in the massively parallel computation model
Explainable clustering provides human-understandable reasons for decisions in black-box
learning models. In a previous work, a decision tree built on the set of dimensions was used …
learning models. In a previous work, a decision tree built on the set of dimensions was used …
Detecting Internet-of-Things Malware on Evidence Generation
Malware has been a real threat to Internet of Things (IoT). Although commercial antivirus
solutions can detect malware files and provide label information indicating malware types or …
solutions can detect malware files and provide label information indicating malware types or …
[PDF][PDF] Maximizing Business Performance through Artificial Intelligence
M Hasan, JB Sharif, M Kwosar, MF Ahmed… - … Journal of Computer …, 2024 - researchgate.net
Artificial Intelligence (AI) has emerged as a transformative force in modern business, driving
significant improvements in efficiency, decision-making, and customer engagement. By …
significant improvements in efficiency, decision-making, and customer engagement. By …
[PDF][PDF] Addressing IoT Security Challenges through AI Solutions
MS Uddin - International Journal of Computer Applications, 2024 - researchgate.net
ABSTRACT The Internet of Things (IoT) is a widely recognized technology that profoundly
influences various sectors, including connectivity, work, healthcare, and the economy. IoT …
influences various sectors, including connectivity, work, healthcare, and the economy. IoT …
WIF: Efficient Library for Network Traffic Analysis
Network traffic classification and analysis are crucial for maintaining computer security.
Nevertheless, the rise of encrypted traffic has made reliable threat detection increasingly …
Nevertheless, the rise of encrypted traffic has made reliable threat detection increasingly …