Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Use of data visualisation for zero‐day malware detection
S Venkatraman, M Alazab - Security and Communication …, 2018 - Wiley Online Library
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from
malicious software (malware) attackers that calls for efficient monitoring of vulnerable …
malicious software (malware) attackers that calls for efficient monitoring of vulnerable …
The role of security notices and online consumer behaviour: An empirical study of social networking users
This paper uses a survey of social networking users to empirically explore their perceptions
of security notices–independently verified artefacts informing internet site users that security …
of security notices–independently verified artefacts informing internet site users that security …
Methods for host-based intrusion detection with deep learning
Host-based Intrusion Detection Systems (HIDS) automatically detect events that indicate
compromise by adversarial applications. HIDS are generally formulated as analyses of …
compromise by adversarial applications. HIDS are generally formulated as analyses of …
Ensemble visualization for cyber situation awareness of network security data
L Hao, CG Healey… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Network security analysis and ensemble data visualization are two active research areas.
Although they are treated as separate domains, they share many common challenges and …
Although they are treated as separate domains, they share many common challenges and …
Enhancing cyber situation awareness for non-expert users using visual analytics
PA Legg - 2016 International Conference On Cyber Situational …, 2016 - ieeexplore.ieee.org
Situation awareness is often described as the perception and comprehension of the current
situation, and the projection of future status. Whilst this may be understood in an …
situation, and the projection of future status. Whilst this may be understood in an …
Visual analytics for cyber security domain: State-of-the-art and challenges
Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the
information visualization methods for facilitating effective analysis of data by employing …
information visualization methods for facilitating effective analysis of data by employing …
Flexible web visualization for alert-based network security analytics
L Hao, CG Healey, SE Hutchinson - Proceedings of the tenth workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …
Weaving a carpet from log entries: A network security visualization built with co-creation
J Landstorfer, I Herrmann, JE Stange… - … IEEE Conference on …, 2014 - ieeexplore.ieee.org
We created a pixel map for multivariate data based on an analysis of the needs of network
security engineers. Parameters of a log record are shown as pixels and these pixels are …
security engineers. Parameters of a log record are shown as pixels and these pixels are …
Discovery of rating fraud with real-time streaming visual analytics
K Webga, A Lu - 2015 IEEE symposium on visualization for …, 2015 - ieeexplore.ieee.org
The rating fraud in online e-commerce stores targets at receiving large revenues through
boosting the popularity of selected items with fake ratings. The challenges of detecting rating …
boosting the popularity of selected items with fake ratings. The challenges of detecting rating …
Technical threat intelligence analytics: What and how to visualize for analytic process
R Damasevicius, J Toldinas… - 2020 24th …, 2020 - ieeexplore.ieee.org
Visual Analytics uses data visualization techniques for enabling compelling data analysis by
engaging graphical and visual portrayal. In the domain of cybersecurity, convincing visual …
engaging graphical and visual portrayal. In the domain of cybersecurity, convincing visual …