Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
[HTML][HTML] A review on machine learning techniques for secured cyber-physical systems in smart grid networks
The smart grid (SG) is an advanced cyber-physical system (CPS) that integrates power grid
infrastructure with information and communication technologies (ICT). This integration …
infrastructure with information and communication technologies (ICT). This integration …
[HTML][HTML] Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures
G González-Granadillo, S González-Zarzosa, R Diaz - Sensors, 2021 - mdpi.com
Security Information and Event Management (SIEM) systems have been widely deployed as
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …
Modeling, detecting, and mitigating threats against industrial healthcare systems: a combined software defined networking and reinforcement learning approach
P Radoglou-Grammatikis, K Rompolos… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The rise of the Internet of Medical Things introduces the healthcare ecosystem in a new
digital era with multiple benefits, such as remote medical assistance, real-time monitoring …
digital era with multiple benefits, such as remote medical assistance, real-time monitoring …
[PDF][PDF] Situational aware access control to prevent android malware
K Skalski, K Dombrokova, W Szczawinski - 2024 - osf.io
Android malware poses a significant threat to the security and privacy of users worldwide,
requiring advanced protective measures. A novel and significant contribution to Android …
requiring advanced protective measures. A novel and significant contribution to Android …
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …
approach is proposed in this assessment to deal with the problem of identifying new …
Sok: Pragmatic assessment of machine learning for network intrusion detection
G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
AB Mohammed, LC Fourati, AM Fakhrudeen - Computer Networks, 2024 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) have evolved into a pivotal component of
electronic devices deployed across a diverse array of sectors and industries in recent years …
electronic devices deployed across a diverse array of sectors and industries in recent years …
Cybersecurity challenges in IoT-based smart renewable energy
Abstract The Internet of Things (IoT) makes it possible to collect data from, and issue
commands to, devices via the Internet, eliminating the need for humans in the process while …
commands to, devices via the Internet, eliminating the need for humans in the process while …
Enhancing security in cloud computing using artificial intelligence (AI)
D Stutz, JT de Assis, AA Laghari… - … Analytics and Cyber …, 2024 - Wiley Online Library
Cloud computing (CC) technologies (viz artificial intelligence (AI), data science,
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …