Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Botnets: A survey
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …
serious threat to the Internet. Such networks have been created to conduct large-scale …
Survey on botnet detection techniques: Classification, methods, and evaluation
Y **ng, H Shu, H Zhao, D Li… - Mathematical Problems in …, 2021 - Wiley Online Library
With the continuous evolution of the Internet, as well as the development of the Internet of
Things, smart terminals, cloud platforms, and social platforms, botnets showing the …
Things, smart terminals, cloud platforms, and social platforms, botnets showing the …
Graphsmote: Imbalanced node classification on graphs with graph neural networks
Node classification is an important research topic in graph learning. Graph neural networks
(GNNs) have achieved state-of-the-art performance of node classification. However, existing …
(GNNs) have achieved state-of-the-art performance of node classification. However, existing …
Heterogeneous graph neural networks for malicious account detection
We present, GEM, the first heterogeneous graph neural network approach for detecting
malicious accounts at Alipay, one of the world's leading mobile cashless payment platform …
malicious accounts at Alipay, one of the world's leading mobile cashless payment platform …
Aiding the detection of fake accounts in large scale social online services
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …
Networks (OSNs). In addition, OSN providers base their business models on the …
A nonparametric view of network models and Newman–Girvan and other modularities
Prompted by the increasing interest in networks in many fields, we present an attempt at
unifying points of view and analyses of these objects coming from the social sciences …
unifying points of view and analyses of these objects coming from the social sciences …
Uncovering large groups of active malicious accounts in online social networks
The success of online social networks has attracted a constant interest in attacking and
exploiting them. Attackers usually control malicious accounts, including both fake and …
exploiting them. Attackers usually control malicious accounts, including both fake and …
Detecting algorithmically generated malicious domain names
Recent Botnets such as Conficker, Kraken and Torpig have used DNS based" domain
fluxing" for command-and-control, where each Bot queries for existence of a series of …
fluxing" for command-and-control, where each Bot queries for existence of a series of …
[PDF][PDF] Volley: Automated data placement for geo-distributed cloud services
As cloud services grow to span more and more globally distributed datacenters, there is an
increasingly urgent need for automated mechanisms to place application data across these …
increasingly urgent need for automated mechanisms to place application data across these …
Detecting algorithmically generated domain-flux attacks with DNS traffic analysis
Recent botnets such as Conficker, Kraken, and Torpig have used DNS-based “domain
fluxing” for command-and-control, where each Bot queries for existence of a series of …
fluxing” for command-and-control, where each Bot queries for existence of a series of …