Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A review of ensemble learning and data augmentation models for class imbalanced problems: Combination, implementation and evaluation
Class imbalance (CI) in classification problems arises when the number of observations
belonging to one class is lower than the other. Ensemble learning combines multiple models …
belonging to one class is lower than the other. Ensemble learning combines multiple models …
[HTML][HTML] The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review
As digital transformation continues to advance, organisations are becoming increasingly
aware of the benefits that modern technologies offer. However, with greater technology …
aware of the benefits that modern technologies offer. However, with greater technology …
[HTML][HTML] IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
A network intrusion detection system is critical for cyber security against illegitimate attacks.
In terms of feature perspectives, network traffic may include a variety of elements such as …
In terms of feature perspectives, network traffic may include a variety of elements such as …
CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls
In this paper, we propose a novel model for a malware classification system based on
Application Programming Interface (API) calls and opcodes, to improve classification …
Application Programming Interface (API) calls and opcodes, to improve classification …
GA-StackingMD: Android malware detection method based on genetic algorithm optimized stacking
N **e, Z Qin, X Di - Applied Sciences, 2023 - mdpi.com
With the rapid development of network and mobile communication, intelligent terminals such
as smartphones and tablet computers have changed people's daily life and work. However …
as smartphones and tablet computers have changed people's daily life and work. However …
Optimized and efficient image-based IoT malware detection method
With the widespread use of IoT applications, malware has become a difficult and
sophisticated threat. Without robust security measures, a massive volume of confidential and …
sophisticated threat. Without robust security measures, a massive volume of confidential and …
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Abstract In recent years, Advanced Persistent Threat (APT) attacks on network systems have
increased through sophisticated fraud tactics. Traditional Intrusion Detection Systems (IDSs) …
increased through sophisticated fraud tactics. Traditional Intrusion Detection Systems (IDSs) …
Enhanced network intrusion detection system for internet of things security using multimodal big data representation with transfer learning and game theory
Internet of Things (IoT) applications and resources are highly vulnerable to flood attacks,
including Distributed Denial of Service (DDoS) attacks. These attacks overwhelm the …
including Distributed Denial of Service (DDoS) attacks. These attacks overwhelm the …
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks
The open-source nature of Android, along with its coarse-grained permission management
and widespread use, has heightened its vulnerability to malware threats. However, many …
and widespread use, has heightened its vulnerability to malware threats. However, many …
[HTML][HTML] Enhancing android malware detection explainability through function call graph APIs
Nowadays, mobile devices are massively used in everyday activities. Thus, they contain
sensitive data targeted by threat actors like bank accounts and personal information …
sensitive data targeted by threat actors like bank accounts and personal information …