Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning for email spam filtering: review, approaches and open research problems
The upsurge in the volume of unwanted emails called spam has created an intense need for
the development of more dependable and robust antispam filters. Machine learning …
the development of more dependable and robust antispam filters. Machine learning …
Applicability of machine learning in spam and phishing email filtering: review and approaches
With the influx of technological advancements and the increased simplicity in
communication, especially through emails, the upsurge in the volume of unsolicited bulk …
communication, especially through emails, the upsurge in the volume of unsolicited bulk …
Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms
AM Maigida, SM Abdulhamid, M Olalere… - Journal of Reliable …, 2019 - Springer
Ransomware is advanced and upgraded malicious software which comes in the forms of
Crypto or Locker, with the intention to attack and take control of basic infrastructures and …
Crypto or Locker, with the intention to attack and take control of basic infrastructures and …
Cloud computing service for knowledge assessment and studies recommendation in crowdsourcing and collaborative learning environments based on social network …
Interactions among people have substantially changed since the emergence of social
networks, the expansion of the Internet and the proliferation of connected mobile devices …
networks, the expansion of the Internet and the proliferation of connected mobile devices …
An artificial immunity approach to malware detection in a mobile platform
Inspired by the human immune system, we explore the development of a new Multiple-
Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on …
Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on …
Detection of mobile malware: an artificial immunity approach
Inspired by the human immune system, we explore the development of a new multiple
detector set artificial immune system (mAIS) for the detection of mobile malware based on …
detector set artificial immune system (mAIS) for the detection of mobile malware based on …
Analysis of the use of artificial immune systems
RM Mikherskii, MR Mikherskii - IOP Conference Series: Materials …, 2021 - iopscience.iop.org
Artificial immune systems are systems of artificial intelligence at the basis of work, which are
based on the principles of the functioning of the biological immune system. These systems …
based on the principles of the functioning of the biological immune system. These systems …
Towards understanding an open-source bounty: Analysis of bountysource
When develo** and maintaining a software project, many issues about bug fixing or
feature addition are reported on the Bug Tracking System (BTS) and the Issue Tracking …
feature addition are reported on the Bug Tracking System (BTS) and the Issue Tracking …
Intrusion detection using a multiple-detector set artificial immune system
The goal of an intrusion detection system (IDS) is to monitor activities to detect breaches in
security policies of a computer system or a network. This paper focuses on anomaly …
security policies of a computer system or a network. This paper focuses on anomaly …
Review on email spam filtering techniques
N Nisar, N Rakesh, M Chhabra - International Journal of …, 2021 - ijpe-online.com
A huge increase in the number of spam emails has led to the requirement for the evolution of
more reliable and robust anti-spam techniques or filters that are utilized for preventing these …
more reliable and robust anti-spam techniques or filters that are utilized for preventing these …