Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …
[PDF][PDF] The role of machine learning in network anomaly detection for cybersecurity
A Yaseen - Sage Science Review of Applied Machine Learning, 2023 - researchgate.net
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …
An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets
Security in IoT networks is currently mandatory, due to the high amount of data that has to be
handled. These systems are vulnerable to several cybersecurity attacks, which are …
handled. These systems are vulnerable to several cybersecurity attacks, which are …
An agile approach to identify single and hybrid normalization for enhancing machine learning-based network intrusion detection
MA Siddiqi, W Pak - IEEE Access, 2021 - ieeexplore.ieee.org
Detecting intrusion in network traffic has remained a problematic task for years. Progress in
the field of machine learning is paving the way for enhancing intrusion detection systems …
the field of machine learning is paving the way for enhancing intrusion detection systems …
[HTML][HTML] Edge intelligence in Smart Grids: A survey on architectures, offloading models, cyber security measures, and challenges
DN Molokomme, AJ Onumanyi… - Journal of Sensor and …, 2022 - mdpi.com
The rapid development of new information and communication technologies (ICTs) and the
deployment of advanced Internet of Things (IoT)-based devices has led to the study and …
deployment of advanced Internet of Things (IoT)-based devices has led to the study and …
Chaining Zscore and feature scaling methods to improve neural networks for classification
C Nkikabahizi, W Cheruiyot, A Kibe - Applied Soft Computing, 2022 - Elsevier
Neural networks for classification aim at identifying the class label of new observation based
training data containing instances whose category memberships are known. Therefore the …
training data containing instances whose category memberships are known. Therefore the …
[HTML][HTML] Leveraging explainable artificial intelligence in real-time cyberattack identification: Intrusion detection system approach
Cyberattacks are part of the continuous race, where research in computer science both
contributes to discovering new threats and vulnerabilities and also mitigates them. When …
contributes to discovering new threats and vulnerabilities and also mitigates them. When …
Emergency Evaluation in Connected and Automated Vehicles
E Eziama - 2021 - search.proquest.com
An intelligent transportation system (ITS) provides improved transport efficiency and safety
based on vehicle communication. Connected and automated vehicles (CAVs) as part of an …
based on vehicle communication. Connected and automated vehicles (CAVs) as part of an …
Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection
T Zoppi, A Ceccarelli - Journal of Network and Computer Applications, 2021 - Elsevier
In the last decades, researchers, practitioners and companies struggled in devising
mechanisms to detect malicious activities originating security threats. Amongst the many …
mechanisms to detect malicious activities originating security threats. Amongst the many …
[PDF][PDF] ATTACKS DETECTION IN INTERNET OF THINGS USING MACHINE LEARNING TECHNIQUES: A REVIEW
AAAAD Saleem, AA Abdulrahman - Journal of Applied …, 2024 - researchgate.net
The proliferation of IoT devices across sectors such as home automation, business,
healthcare, and transportation has led to the generation of vast amounts of sensitive data …
healthcare, and transportation has led to the generation of vast amounts of sensitive data …