Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Blocking-resistant communication through domain fronting
We describe “domain fronting,” a versatile censorship circumvention technique that hides
the remote endpoint of a communication. Domain fronting works at the application layer …
the remote endpoint of a communication. Domain fronting works at the application layer …
Elligator: elliptic-curve points indistinguishable from uniform random strings
Censorship-circumvention tools are in an arms race against censors. The censors study all
traffic passing into and out of their controlled sphere, and try to disable censorship …
traffic passing into and out of their controlled sphere, and try to disable censorship …
Bringing a gan to a knife-fight: Adapting malware communication to avoid detection
Generative Adversarial Networks (GANs) have been successfully used in a large number of
domains. This paper proposes the use of GANs for generating network traffic in order to …
domains. This paper proposes the use of GANs for generating network traffic in order to …
The parrot is dead: Observing unobservable network communications
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …
censors in non-democratic countries have increased their technical capabilities and can …
Meteor: Cryptographically secure steganography for realistic distributions
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …
systems, practical steganographic systems capable of embedding messages into realistic …
[PDF][PDF] The cyber security body of knowledge
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Seeing through network-protocol obfuscation
Censorship-circumvention systems are designed to help users bypass Internet censorship.
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …
Protocol misidentification made easy with format-transforming encryption
Deep packet inspection (DPI) technologies provide much-needed visibility and control of
network traffic using port-independent protocol identification, where a network flow is …
network traffic using port-independent protocol identification, where a network flow is …