Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
A survey of intelligent detection designs of HTML URL phishing attacks
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social
engineering attacks where an attacker deceives users by sending fake messages using …
engineering attacks where an attacker deceives users by sending fake messages using …
Attacks on formation control for multiagent systems
Multiagent systems (MASs) are distributed systems with two or more intelligent agents.
Formation control is a significant control technique of MASs. To date, formation control on …
Formation control is a significant control technique of MASs. To date, formation control on …
How to disturb network reconnaissance: A moving target defense approach based on deep reinforcement learning
With the explosive growth of Internet traffic, large sensitive and valuable information is at risk
of cyber attacks, which are mostly preceded by network reconnaissance. A moving target …
of cyber attacks, which are mostly preceded by network reconnaissance. A moving target …
Swarm intelligence inspired intrusion detection systems—a systematic literature review
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …
securing a network. A huge number of techniques have been proposed and implemented to …
Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model
The botnet have developed into a severe risk to Internet of Things (IoT) systems as a result
of manufacturers 'insufficient security policies and end users' lack of security awareness. By …
of manufacturers 'insufficient security policies and end users' lack of security awareness. By …
A survey of ddos attack and defense technologies in multi-access edge computing
Y Ma, L Liu, Z Liu, F Li, Q **e, K Chen… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Multiaccess edge computing (MEC) is a novel service paradigm located at the network's
edge, where servers with computation and storage capabilities are placed in proximity to …
edge, where servers with computation and storage capabilities are placed in proximity to …
[HTML][HTML] Predicting ddos attacks using machine learning algorithms in building management systems
The rapid growth of the Internet of Things (IoT) in smart buildings necessitates the
continuous evaluation of potential threats and their implications. Conventional methods are …
continuous evaluation of potential threats and their implications. Conventional methods are …
Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks
H Cheng, J Liu, T Xu, B Ren, J Mao… - … Journal of Sensor …, 2020 - inderscienceonline.com
The software-defined network (SDN) enabled internet of things (IoT) architecture is deployed
in many industrial systems. The ability of SDN to intelligently route traffic and use …
in many industrial systems. The ability of SDN to intelligently route traffic and use …
Secure state estimation with switched compensation mechanism against DoS attacks
JJ Yan, GH Yang - IEEE Transactions on Cybernetics, 2021 - ieeexplore.ieee.org
This article is concerned with the secure state estimation problem for cyber-physical systems
under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the …
under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the …