Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
Analysis of IoT security challenges and its solutions using artificial intelligence
The Internet of Things (IoT) is a well-known technology that has a significant impact on many
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
[کتاب][B] Dive into deep learning
Deep learning has revolutionized pattern recognition, introducing tools that power a wide
range of technologies in such diverse fields as computer vision, natural language …
range of technologies in such diverse fields as computer vision, natural language …
[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges
KB Adedeji, AM Abu-Mahfouz, AM Kurien - Journal of Sensor and …, 2023 - mdpi.com
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …
security threats in internet-enabled networks, with many internet of things (IoT) devices …
Ensemble-learning framework for intrusion detection to enhance internet of things' devices security
Y Alotaibi, M Ilyas - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) comprises a network of interconnected nodes constantly
communicating, exchanging, and transferring data over various network protocols. Studies …
communicating, exchanging, and transferring data over various network protocols. Studies …
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
Securing wireless sensor networks using machine learning and blockchain: A review
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …
[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …
the internet, enable remote monitoring, automation, and control. However, collecting …