Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
HGHAN: Hacker group identification based on heterogeneous graph attention network
The hacker group identification is an important pre-work for tasks such as hacking tracing,
criminal portraits. The current hacker identification mainly relies on fingerprints and clue …
criminal portraits. The current hacker identification mainly relies on fingerprints and clue …
CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis
Criminal profiling is a useful technique to identify the most plausible suspects based on the
evidence discovered at the crime scene. Similar to offline criminal profiling, in‐depth …
evidence discovered at the crime scene. Similar to offline criminal profiling, in‐depth …
Hacker group identification based on dynamic heterogeneous graph node update
This paper addresses the critical task of hacker identification within the cyber traceability
system. While the latest hacker group identification method based on the heterogeneous …
system. While the latest hacker group identification method based on the heterogeneous …
[HTML][HTML] Case-based reasoning for hidden property analysis of judgment debtors
Many judgment debtors try to evade, confront, and delay law enforcement using concealing
and transferring their property to resist law enforcement in China. The act of hiding property …
and transferring their property to resist law enforcement in China. The act of hiding property …
Cyber-attack group analysis method based on association of cyber-attack information
K Son, B Kim, T Lee - KSII Transactions on Internet and Information …, 2020 - koreascience.kr
Cyber-attacks emerge in a more intelligent way, and various security technologies are
applied to respond to such attacks. Still, more and more people agree that individual …
applied to respond to such attacks. Still, more and more people agree that individual …
Cyberattack intensity forecasting on informatization objects of critical infrastructures
YM Krakovsky, AN Luzgin… - IOP Conference Series …, 2019 - iopscience.iop.org
In regulatory documents of recent years in the field of information security, much attention is
paid to information systems of critical infrastructures. This, in turn, justifies the need for …
paid to information systems of critical infrastructures. This, in turn, justifies the need for …
[PDF][PDF] Multi-Agent Case-Based Reasoning: a Network Intrusion Detection System.
JM Schoenborn, KD Althoff - LWDA, 2022 - ceur-ws.org
We propose a multi-agent case-based reasoning system to detect malicious traffic in a
network. We introduce ten topic agents, including nine different attack categories and one …
network. We introduce ten topic agents, including nine different attack categories and one …
Interval forecasting of cyber-attacks on industrial control systems
YM Ivanyo, YM Krakovsky… - IOP Conference Series …, 2018 - iopscience.iop.org
At present, cyber-security issues of industrial control systems occupy one of the key niches
in a state system of planning and management Functional disruption of these systems via …
in a state system of planning and management Functional disruption of these systems via …
Case-Based Reasoning and Computer Vision for Cybersecurity: A Short Review
The integration of case-based reasoning (CBR) and computer vision (CV) holds significant
promise for enhancing cybersecurity, enabling the analysis and interpretation of visual data …
promise for enhancing cybersecurity, enabling the analysis and interpretation of visual data …
MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류.
최창희, 신찬호, 신성욱 - Journal of Internet Computing & …, 2022 - search.ebscohost.com
요 약정보통신 환경의 발전으로 인하여 군사 시설의 환경 또한 많은 발전이 이루어지고 있다.
이에 비례하여 사이버 위협도 증가하고있으며, 특히 기존 시그니처 기반 사이버 방어체계로는 …
이에 비례하여 사이버 위협도 증가하고있으며, 특히 기존 시그니처 기반 사이버 방어체계로는 …