Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Network intrusion detection via flow-to-image conversion and vision transformer classification
CMK Ho, KC Yow, Z Zhu, S Aravamuthan - IEEE Access, 2022 - ieeexplore.ieee.org
In recent years, computer networks have become an indispensable part of our life, and these
networks are vulnerable to various type of network attacks, compromising the security of our …
networks are vulnerable to various type of network attacks, compromising the security of our …
An overview of DoS and DDoS attack detection techniques
M Gniewkowski - … Conference on Dependability and Complex Systems, 2020 - Springer
The economic impact of (distributed) denial-of-service attacks is substantial, especially at a
time when we rely on web applications more and more often. That is why, it is essential to be …
time when we rely on web applications more and more often. That is why, it is essential to be …
iReTADS: An Intelligent Real‐Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network
A new distributed environment at less financial expenditure on communication over the
Internet is presented by cloud computing. In recent times, the increased number of users has …
Internet is presented by cloud computing. In recent times, the increased number of users has …
DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory
Y Chen, X Ma, X Wu - IEEE Communications Letters, 2013 - ieeexplore.ieee.org
Distributed denial-of-service (DDoS) flooding attacks still pose great threats to the Internet
even though various approaches and systems have been proposed. In this paper, we firstly …
even though various approaches and systems have been proposed. In this paper, we firstly …
Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT)
Network security plays a vital role in protecting the resources available in the network
against various threats. There are vulnerabilities in every system connected to the network …
against various threats. There are vulnerabilities in every system connected to the network …
Network traffic forecasting model based on long-term intuitionistic fuzzy time series
X Fan, Y Wang, M Zhang - Information sciences, 2020 - Elsevier
In this paper, a network traffic forecasting model based on long-term intuitionistic fuzzy time
series (LT-IFTS) is proposed. It describes the fuzziness and uncertainty of network flow and …
series (LT-IFTS) is proposed. It describes the fuzziness and uncertainty of network flow and …
Detection of distributed denial of service attacks based on information theoretic approach in time series models
DDoS is becoming one of the most powerful and dangerous cyber-attacks. Tremendous
research efforts have already been carried out in the detection of DDoS attacks. Entropy is a …
research efforts have already been carried out in the detection of DDoS attacks. Entropy is a …
Identification of monthly municipal water demand system based on autoregressive integrated moving average model tuned by particle swarm optimization
S Boubaker - Journal of Hydroinformatics, 2017 - iwaponline.com
In this paper, a modeling-identification approach for the monthly municipal water demand
system in Hail region, Saudi Arabia, is developed. This approach is based on an auto …
system in Hail region, Saudi Arabia, is developed. This approach is based on an auto …
Improving the performance of public transport bus services: analytics approach to revenue forecasting
With the current energy crisis and the increase in the price of petroleum products, public bus
transportation is an unavoidable choice for many vehicle users. Public bus companies face …
transportation is an unavoidable choice for many vehicle users. Public bus companies face …
A chaotic complexity measure for cognitive machine classification of cyber-attacks on computer networks
Today's evolving cyber security threats demand new, modern, and cognitive computing
approaches to network security systems. In the early years of the Internet, a simple packet …
approaches to network security systems. In the early years of the Internet, a simple packet …