Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
Nowadays, cybersecurity challenges and their ever-growing complexity are the main
concerns for various information technology-driven organizations and companies. Although …
concerns for various information technology-driven organizations and companies. Although …
Deep learning-based intrusion detection systems: a systematic review
Nowadays, the ever-increasing complication and severity of security attacks on computer
networks have inspired security researchers to incorporate different machine learning …
networks have inspired security researchers to incorporate different machine learning …
Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …
Machine learning in network anomaly detection: A survey
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …
networks against malicious access is always challenging even though it has been studied …
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
Abnormal traffic detection system in SDN based on deep learning hybrid models
K Wang, Y Fu, X Duan, T Liu, J Xu - Computer communications, 2024 - Elsevier
Software defined network (SDN) provides technical support for network construction of smart
cities. However, the openness of SDN is also prone to more network attacks. Traditional …
cities. However, the openness of SDN is also prone to more network attacks. Traditional …
Using differential evolution and Moth–Flame optimization for scientific workflow scheduling in fog computing
Fog computing is an interesting technology aimed at providing various processing and
storage resources at the IoT networks' edge. Energy consumption is one of the essential …
storage resources at the IoT networks' edge. Energy consumption is one of the essential …
ELA-RCP: An energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks
Software-defined networking is a modern and popular network technology that utilizes
controllers as network operating systems to manage the network and allow user applications …
controllers as network operating systems to manage the network and allow user applications …
Towards security automation in software defined networks
Abstract Software-Defined Networking (SDN) is a modern paradigm that provides a platform
for implementing reliable, centrally managed, and automated security solutions for …
for implementing reliable, centrally managed, and automated security solutions for …
A new energy-efficient and temperature-aware routing protocol based on fuzzy logic for multi-WBANs
Temperature-aware routing of the sensed data is one of the significant challenges in
Wireless Body Area Networks (WBANs). This article presents a novel fuzzy logic-based and …
Wireless Body Area Networks (WBANs). This article presents a novel fuzzy logic-based and …