Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …
technology in the manufacturing sector with consideration for offensive and defensive uses …
A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …
Identification of malicious activities in industrial internet of things based on deep learning models
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …
and services with physical systems have become a new direction of research as they face …
Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks
The prevalence of interconnected appliances and ubiquitous computing face serious threats
from the hostile activities of network attackers. Conventional Intrusion Detection Systems …
from the hostile activities of network attackers. Conventional Intrusion Detection Systems …
Introducing deep learning self-adaptive misuse network intrusion detection systems
The intrusion detection systems (IDSs) are essential elements when it comes to the
protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high …
protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high …
The use of computational intelligence in intrusion detection systems: A review
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
A systematic survey on multi-step attack detection
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …
They have become more complex concurrently with computer networks. Nowadays …
Recent advances in artificial immune systems: models and applications
The immune system is a remarkable information processing and self learning system that
offers inspiration to build artificial immune system (AIS). The field of AIS has obtained a …
offers inspiration to build artificial immune system (AIS). The field of AIS has obtained a …
A survey on intrusion detection and prevention in wireless ad-hoc networks
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …
their vast variety of applications in majority fields. Due to their features such as hostile …
[کتاب][B] Immunological computation: theory and applications
D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …