Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning techniques to detect a DDoS attack in SDN: A systematic review
The recent advancements in security approaches have significantly increased the ability to
identify and mitigate any type of threat or attack in any network infrastructure, such as a …
identify and mitigate any type of threat or attack in any network infrastructure, such as a …
Security of Internet of Things (IoT) using federated learning and deep learning—Recent advancements, issues and prospects
There is a great demand for an efficient security framework which can secure IoT systems
from potential adversarial attacks. However, it is challenging to design a suitable security …
from potential adversarial attacks. However, it is challenging to design a suitable security …
Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS attacks
Abstract Software Defined Networking (SDN) has become popular due to its flexibility and
agility in network management, enabling rapid adaptation to changing business …
agility in network management, enabling rapid adaptation to changing business …
[HTML][HTML] DDoS attack detection in IoT-based networks using machine learning models: A survey and research directions
With the emergence of technology, the usage of IoT (Internet of Things) devices is said to be
increasing in people's lives. Such devices can benefit the average individual, who does not …
increasing in people's lives. Such devices can benefit the average individual, who does not …
Detecting cyber threats with a Graph-Based NIDPS
BOT Wen, N Syahriza, NCW **an, NG Wei… - … Measures for Logistics …, 2024 - igi-global.com
This chapter explores the topic of a novel network-based intrusion detection system (NIDPS)
that utilises the concept of graph theory to detect and prevent incoming threats. With …
that utilises the concept of graph theory to detect and prevent incoming threats. With …
Autonomous threat hunting: A future paradigm for AI-driven threat intelligence
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN
Abstract The Internet of Things (IoT) is connecting more devices every day. Security is critical
to ensure that the devices operate in a trusted environment. The lack of proper IoT security …
to ensure that the devices operate in a trusted environment. The lack of proper IoT security …
Artificial Intelligence and machine learning in drug discovery and development
Drug discovery has undergone significant changes over the past decade thanks to artificial
intelligence (AI). To improve the efficiency and precision of medication research and …
intelligence (AI). To improve the efficiency and precision of medication research and …
Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms
Distributed denial of service attacks are common and very severe threat to various
computing technology like Cloud, IoT and Blockchain because of the disruption they cause …
computing technology like Cloud, IoT and Blockchain because of the disruption they cause …
[PDF][PDF] Wireless Technology Security and Privacy: A Comprehensive Study
H Azam, M Tan, LT Pin, MA Syahmi, ALW Qian… - Preprint, 2023 - preprints.org
Since the advent of the Internet, there has been a significant shift from wired to wireless
communication between devices. The volume of data transmitted has surged, primarily …
communication between devices. The volume of data transmitted has surged, primarily …