Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Abnormal behavior detection of enterprise entities using time-series data
A machine-readable medium may store instructions execut able by a processing resource to
access log data of an enterprise and extract time-series data of an enterprise entity from the …
access log data of an enterprise and extract time-series data of an enterprise entity from the …
Detection of dns ddos attacks with random forest algorithm on spark
Abstract Domain Name System (DNS) is one of the most foundational and essential services
on the Internet, the security and robustness of DNS are of great significance. However, the …
on the Internet, the security and robustness of DNS are of great significance. However, the …
Detection of phishing websites using a novel twofold ensemble model
Purpose Phishing is one of the major threats affecting businesses worldwide in current
times. Organizations and customers face the hazards arising out of phishing attacks …
times. Organizations and customers face the hazards arising out of phishing attacks …
Learning semantic information from Internet Domain Names using word embeddings
Word embeddings is a well-known set of techniques widely used in Natural Language
Processing (NLP). These techniques are able to learn words' semantic based on the …
Processing (NLP). These techniques are able to learn words' semantic based on the …
Statistical models for the number of successful cyber intrusions
We propose several generalized linear models (GLMs) to predict the number of successful
cyber intrusions (or “intrusions”) into an organization's computer network, where the rate at …
cyber intrusions (or “intrusions”) into an organization's computer network, where the rate at …
A cause-based classification approach for malicious DNS queries detected through blacklists
Some of the most serious security threats facing computer networks involve malware. To
prevent this threat, administrators need to swiftly remove the infected machines from their …
prevent this threat, administrators need to swiftly remove the infected machines from their …
NetMiner: Identifying Failure-Inducing Patterns in the Logs Generated by Network Monitoring Software
GR Sathi, L Vedullapalli, MH Kishan… - 2023 14th …, 2023 - ieeexplore.ieee.org
To ensure uninterrupted network communication among multiple sources, the network
administrator needs to do real-time monitoring of network logs. Due to its huge volume and …
administrator needs to do real-time monitoring of network logs. Due to its huge volume and …
Vector representation of internet domain names using a word embedding technique
W Lopez, J Merlino… - 2017 XLIII Latin American …, 2017 - ieeexplore.ieee.org
Word embeddings is a well known set of techniques widely used in natural language
processing (NLP), and word2vec is a computationally-efficient predictive model to learn …
processing (NLP), and word2vec is a computationally-efficient predictive model to learn …
Association rules and frequent patterns
G Di Fatta - 2019 - books.google.com
Association Rule Mining (ARM)(Agrawal et al., 1993; Agrawal and Srikant, 1994; Hipp et al.,
2000) is often referred to as frequent pattern mining (Goethals, 2003; Han et al., 2007; …
2000) is often referred to as frequent pattern mining (Goethals, 2003; Han et al., 2007; …
Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems
The existing domain name system relies heavily on the root domain name server and has
unilateral management problems, which is not conducive to the open and equal …
unilateral management problems, which is not conducive to the open and equal …