Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Explainable artificial intelligence applications in cyber security: State-of-the-art in research
This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …
A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system
A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …
academics' and business information systems' attention in recent years. The Internet of …
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …
significant attention from the research community. To this end, several surveys were put …
N-baiot—network-based detection of iot botnet attacks using deep autoencoders
The proliferation of IoT devices that can be more easily compromised than desktop
computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is …
computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is …
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …
information technology, while the exponentially increasing number of tiny, connected …
Deep learning and big data technologies for IoT security
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …
(IoT), which enables communication and interaction with various devices. However, IoT has …