Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A distributed deep learning system for web attack detection on edge devices
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …
devices and sensors transmit huge amounts of data to cloud data centers for further …
Signature-based and machine-learning-based web application firewalls: A short survey
Abstract Web Application Firewalls (WAF) have evolved to protect web applications from
attack. A signature-based WAF responds to threats through the implementation of …
attack. A signature-based WAF responds to threats through the implementation of …
An anomaly detection method to detect web attacks using stacked auto-encoder
Network borne attacks are currently major threats to information security. Enormous efforts
such as scanners, encryption devices, intrusion detection systems and firewalls have been …
such as scanners, encryption devices, intrusion detection systems and firewalls have been …
OCPAD: One class Naive Bayes classifier for payload based anomaly detection
Application specific attack detection requires packet payload analysis. Current payload
analysis techniques suffer from failed detection as they use only the presence or absence of …
analysis techniques suffer from failed detection as they use only the presence or absence of …
Deep anomaly detection in packet payload
With the wide deployment of edge devices, a variety of emerging applications have been
deployed at the edge of network. To guarantee the safe and efficient operations of the edge …
deployed at the edge of network. To guarantee the safe and efficient operations of the edge …
Leveraging deep neural networks for anomaly‐based web application firewall
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …
services on the Internet. With the launch of web 2.0, information has flourished through …
Detecting attacks on web applications using autoencoder
Web attacks have become a real threat to the Internet. This paper proposes the use of
autoencoder to detect malicious pattern in the HTTP/HTTPS requests. The autoencoder is …
autoencoder to detect malicious pattern in the HTTP/HTTPS requests. The autoencoder is …
[HTML][HTML] Google search based sentiment indexes
A Brochado - IIMB Management Review, 2020 - Elsevier
This study sought to confirm whether Internet search based data have the potential both to
reveal populations' underlying beliefs directly and to affect stock markets of countries–in this …
reveal populations' underlying beliefs directly and to affect stock markets of countries–in this …
[HTML][HTML] A compression-based method for detecting anomalies in textual data
Nowadays, information and communications technology systems are fundamental assets of
our social and economical model, and thus they should be properly protected against the …
our social and economical model, and thus they should be properly protected against the …
Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files
In terms of cyber security, log files represent a rich source of information regarding the state
of a computer service/system. Automating the process of summarizing log file content …
of a computer service/system. Automating the process of summarizing log file content …