Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges
G Kocher, G Kumar - Soft Computing, 2021 - Springer
Deep learning (DL) is gaining significant prevalence in every field of study due to its
domination in training large data sets. However, several applications are utilizing machine …
domination in training large data sets. However, several applications are utilizing machine …
A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
With the world moving towards being increasingly dependent on computers and automation,
one of the main challenges in the current decade has been to build secure applications …
one of the main challenges in the current decade has been to build secure applications …
TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT
Abstract In the Industrial Internet of Things (IIoT) in the 5G era, the growth of smart devices
will generate a large amount of data traffic, bringing a huge challenge of network traffic …
will generate a large amount of data traffic, bringing a huge challenge of network traffic …
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …
building secure applications, systems and networks are some of the main challenges faced …
A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Encrypted traffic classification with a convolutional long short-term memory neural network
Z Zou, J Ge, H Zheng, Y Wu, C Han… - 2018 IEEE 20th …, 2018 - ieeexplore.ieee.org
With the rapidly emerging encryption techniques for network traffic, the classification of
encrypted traffic has increasingly become significantly important in network management …
encrypted traffic has increasingly become significantly important in network management …
[HTML][HTML] Outlier detection strategies for WSNs: A survey
Abstract Wireless Sensor Networks (WSNs) are developed significantly from the last
decades and attracted the attention of scientific and industrial domains. In WSNs, sensor …
decades and attracted the attention of scientific and industrial domains. In WSNs, sensor …
A new hybrid machine learning for cybersecurity threat detection based on adaptive boosting
ABSTRACT A hybrid machine learning is a combination of multiple types of machine
learning algorithms for improving the performance of single classifiers. Currently, cyber …
learning algorithms for improving the performance of single classifiers. Currently, cyber …
Darknet traffic analysis: A systematic literature review
J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
A novel traffic classifier with attention mechanism for industrial internet of things
R Zhao, Y Huang, X Deng, Y Shi, J Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the development of the Industrial Internet of Things (IIoT), the complex traffic generated
by large-scale IIoT devices presents challenges for traffic analysis. Most of existing deep …
by large-scale IIoT devices presents challenges for traffic analysis. Most of existing deep …