Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on cyber situation-awareness systems: Framework, techniques, and insights
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …
are equipped with novel approaches to learn the system and propagate themselves, such as …
A survey of network anomaly visualization
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …
refers to the unusual behavior of network devices or suspicious network status. A number of …
Alert-driven attack graph generation using s-pdfa
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …
to a network under observation. Such CTI currently requires extensive expert input for …
Explainable artificial intelligence for resilient security applications in the Internet of Things
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of
humans in an increasing number of complicated tasks. Highly effective non-linear AI models …
humans in an increasing number of complicated tasks. Highly effective non-linear AI models …
Interactive three-dimensional visualization of network intrusion detection data for machine learning
The threat of cyber-attacks is on the rise in the digital world today. As such, effective
cybersecurity solutions are becoming increasingly important for detecting and combating …
cybersecurity solutions are becoming increasingly important for detecting and combating …
Bayesian network based weighted APT attack paths modeling in cloud computing
A Zimba, H Chen, Z Wang - Future Generation Computer Systems, 2019 - Elsevier
Security vulnerabilities exhibited in cloud computing components and technologies not
limited to hypervisors, virtual machines, and virtualization present a major security concern …
limited to hypervisors, virtual machines, and virtualization present a major security concern …
A review of visualization methods for cyber-physical security: Smart grid case study
Cyber-Physical Systems (CPSs) are becoming increasingly complex and interconnected as
they attempt to meet the demands of evolving society. As a result, monitoring and …
they attempt to meet the demands of evolving society. As a result, monitoring and …
Vulnus: Visual vulnerability analysis for network security
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …
Sage: Intrusion alert-driven attack graph extractor
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a
network. State-of-the-art approaches for AG generation focus mostly on deriving …
network. State-of-the-art approaches for AG generation focus mostly on deriving …
Evaluating visualization approaches to detect abnormal activities in network traffic data
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …
of the most significant research topics in network security. Various computational methods …