Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Improved diagnosis of Parkinson's disease using optimized crow search algorithm
Diagnosis of Parkinson's disease at its early stage is important in proper treatment of the
patients so they can lead productive lives for as long as possible. Although many techniques …
patients so they can lead productive lives for as long as possible. Although many techniques …
Evodeep: a new evolutionary approach for automatic deep neural networks parametrisation
Abstract Deep Neural Networks (DNN) have become a powerful, and extremely popular
mechanism, which has been widely used to solve problems of varied complexity, due to their …
mechanism, which has been widely used to solve problems of varied complexity, due to their …
MOCDroid: multi-objective evolutionary classifier for Android malware detection
Malware threats are growing, while at the same time, concealment strategies are being used
to make them undetectable for current commercial antivirus. Android is one of the target …
to make them undetectable for current commercial antivirus. Android is one of the target …
A short review for ransomware: pros and cons
HA Shakir, AN Jaber - Advances on P2P, Parallel, Grid, Cloud and …, 2018 - Springer
Recently, the software virus Ransomware spread like a cyclone wind. As a cyclone wind
creates atmospheric instability, Ransomware similarly creates computer data instability …
creates atmospheric instability, Ransomware similarly creates computer data instability …
Evolving deep neural networks architectures for android malware classification
Deep Neural Networks (DNN) have become a powerful, widely used, and successful
mechanism to solve problems of different nature and varied complexity. Their ability to build …
mechanism to solve problems of different nature and varied complexity. Their ability to build …
[PDF][PDF] Clustering analysis for malware behavior detection using registry data
The increase of malware attacks may increase risk in information technology industry such
as Industrial Revolution 4.0 that consists of multiple sectors especially in cyber security …
as Industrial Revolution 4.0 that consists of multiple sectors especially in cyber security …
An in-depth study of the jisut family of android ransomware
Android malware is increasing in spread and complexity. Advanced obfuscation, emulation
detection, delayed payload activation or dynamic code loading are some of the techniques …
detection, delayed payload activation or dynamic code loading are some of the techniques …
Evolutionary computation and machine learning in security
S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Nowhere metamorphic malware can hide-a biological evolution inspired detection scheme
The ability to detect metamorphic malware has generated significant research interest over
recent years, particularly given its proliferation on mobile devices. Such malware is …
recent years, particularly given its proliferation on mobile devices. Such malware is …
Structural characterization of titanium-doped Bioglass using isotopic substitution neutron diffraction
RA Martin, RM Moss, NJ Lakhkar… - Physical Chemistry …, 2012 - pubs.rsc.org
Melt quenched silicate glasses containing calcium, phosphorus and alkali metals have the
ability to promote bone regeneration and to fuse to living bone. Of these glasses 45S5 …
ability to promote bone regeneration and to fuse to living bone. Of these glasses 45S5 …