Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On vulnerability and security log analysis: A systematic literature review on recent trends
J Svacina, J Raffety, C Woodahl, B Stone… - Proceedings of the …, 2020 - dl.acm.org
Log analysis is a technique of deriving knowledge from log files containing records of events
in a computer system. A common application of log analysis is to derive critical information …
in a computer system. A common application of log analysis is to derive critical information …
[HTML][HTML] Anomaly detection for space information networks: A survey of challenges, techniques, and future directions
Abstract Space anomaly detection plays a critical role in safeguarding the integrity and
reliability of space systems amid the rising tide of threats. This survey aims to deepen …
reliability of space systems amid the rising tide of threats. This survey aims to deepen …
A survey on forensic investigation of operating system logs
Event logs are one of the most important sources of digital evidence for forensic
investigation because they record essential activities on the system. In this paper, we …
investigation because they record essential activities on the system. In this paper, we …
Machine learning based intrusion detection system
A Halimaa, K Sundarakantham - 2019 3rd International …, 2019 - ieeexplore.ieee.org
In order to examine malicious activity that occurs in a network or a system, intrusion
detection system is used. Intrusion Detection is software or a device that scans a system or a …
detection system is used. Intrusion Detection is software or a device that scans a system or a …
Anomaly detection in operating system logs with deep learning-based sentiment analysis
The purpose of sentiment analysis is to detect an opinion or polarity in text data. We can
apply such an analysis to detect negative sentiment, which represents the anomalous …
apply such an analysis to detect negative sentiment, which represents the anomalous …
Data-driven decision support for optimizing cyber forensic investigations
Cyber attacks consisting of several attack actions can present considerable challenge to
forensic investigations. Consider the case where a cybersecurity breach is suspected …
forensic investigations. Consider the case where a cybersecurity breach is suspected …
Formal concept analysis approach to understand digital evidence relationships
The number of cyber attacks is constantly increasing daily, which demands organizations to
respond quickly and adequately to security incidents. Digital forensics plays an essential …
respond quickly and adequately to security incidents. Digital forensics plays an essential …
Sentiment analysis in a forensic timeline with deep learning
A forensic investigator creates a timeline from a forensic disk image after an occurrence of a
security incident. This procedure aims to acquire the time for all events identified from the …
security incident. This procedure aims to acquire the time for all events identified from the …
Anomaly detection in a forensic timeline with deep autoencoders
An investigator needs to analyze a forensic timeline after a cybersecurity incident has
occurred. Log entries from various sources are used to generate a forensic timeline. Finding …
occurred. Log entries from various sources are used to generate a forensic timeline. Finding …
LEKG: A system for constructing knowledge graphs from log extraction
Logs record system events and status, which help developers and system administrators
diagnose run time errors, monitor running status and mine operation patterns [13, 23] …
diagnose run time errors, monitor running status and mine operation patterns [13, 23] …