Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Research trends in network-based intrusion detection systems: A review
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …
Designing a network intrusion detection system based on machine learning for software defined networks
AO Alzahrani, MJF Alenazi - Future Internet, 2021 - mdpi.com
Software-defined Networking (SDN) has recently developed and been put forward as a
promising and encouraging solution for future internet architecture. Managed, the …
promising and encouraging solution for future internet architecture. Managed, the …
Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review
CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …
vulnerabilities are existing in current virtualization implementations, and thus there are …
Dendron: Genetic trees driven rule induction for network intrusion detection systems
D Papamartzivanos, FG Mármol… - Future Generation …, 2018 - Elsevier
Intrusion detection systems (IDSs) are essential entities in a network topology aiming to
safeguard the integrity and availability of sensitive assets in the protected systems. In misuse …
safeguard the integrity and availability of sensitive assets in the protected systems. In misuse …
Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems
Nowadays, a significant part of all network accesses comes from embedded and battery-
powered devices, which must be energy efficient. This paper demonstrates that a hardware …
powered devices, which must be energy efficient. This paper demonstrates that a hardware …
A study on intrusion detection using neural networks trained with evolutionary algorithms
T Dash - Soft Computing, 2017 - Springer
Intrusion detection has been playing a crucial role for making a computer network secure for
any transaction. An intrusion detection system (IDS) detects various types of malicious …
any transaction. An intrusion detection system (IDS) detects various types of malicious …
Endocrine-based coevolutionary multi-swarm for multi-objective workflow scheduling in a cloud system
G Yao, Y Ding, Y **, K Hao - Soft Computing, 2017 - Springer
The workflow scheduling with multiple objectives is a well-known NP-complete problem, and
even more complex and challenging when the workflow is executed in cloud computing …
even more complex and challenging when the workflow is executed in cloud computing …
Multi‐objective approach of energy efficient workflow scheduling in cloud environments
Scheduling the tasks of a workflow to the cloud resources is a well‐known N‐P hard
problem. The stakeholders involved in a cloud environment have different interests in …
problem. The stakeholders involved in a cloud environment have different interests in …
Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
Cloud computing gained much popularity in the recent past due to its many internet-based
services related to data, application, operating system, and eliminating the need for central …
services related to data, application, operating system, and eliminating the need for central …
Flow-based IDS for ICMPv6-based DDoS attacks detection
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …