Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Anomaly detection: A survey
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …
research areas and application domains. Many anomaly detection techniques have been …
Host-based intrusion detection system with system calls: Review and future trends
M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …
system call traces, which are not suitable for traditional host-based intrusion detection …
[BOEK][B] An introduction to outlier analysis
CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …
mining and statistics literature. In most applications, the data is created by one or more …
Outlier detection for temporal data: A survey
In the statistics community, outlier detection for time series data has been studied for
decades. Recently, with advances in hardware and software technology, there has been a …
decades. Recently, with advances in hardware and software technology, there has been a …
Frequent pattern mining algorithms: A survey
This chapter will provide a detailed survey of frequent pattern mining algorithms. A wide
variety of algorithms will be covered starting from Apriori. Many algorithms such as Eclat …
variety of algorithms will be covered starting from Apriori. Many algorithms such as Eclat …
Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
Anomaly detection for discrete sequences: A survey
V Chandola, A Banerjee… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
This survey attempts to provide a comprehensive and structured overview of the existing
research for the problem of detecting anomalies in discrete/symbolic sequences. The …
research for the problem of detecting anomalies in discrete/symbolic sequences. The …
Automatic analysis of malware behavior using machine learning
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …
systems. The amount and diversity of its variants render classic security defenses ineffective …
Data mining methods for detection of new malicious executables
A serious security threat today is malicious executables, especially new, unseen malicious
executables often arriving as email attachments. These new malicious executables are …
executables often arriving as email attachments. These new malicious executables are …
Use of k-nearest neighbor classifier for intrusion detection
Y Liao, VR Vemuri - Computers & security, 2002 - Elsevier
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify
program behavior as normal or intrusive. Program behavior, in turn, is represented by …
program behavior as normal or intrusive. Program behavior, in turn, is represented by …