Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An AI-powered network threat detection system
BX Wang, JL Chen, CL Yu - IEEE Access, 2022 - ieeexplore.ieee.org
The work develops a network threat detection system, AI@ NTDS, that uses the behavioral
features of attackers and intelligent techniques. The proposed AI@ NTDS system combines …
features of attackers and intelligent techniques. The proposed AI@ NTDS system combines …
Exploiting Honeypot for Cryptojacking: The other side of the story of honeypot deployment
P Patel, A Dalvi, I Sidddavatam - 2022 6th International …, 2022 - ieeexplore.ieee.org
Honeypots are a proactive mechanism to lure attackers into a pretentious setup. Until
recently, honeypots have been applauded for discovering new attacks, attacker behavior …
recently, honeypots have been applauded for discovering new attacks, attacker behavior …
Who is trying to compromise your SSH server? An analysis of authentication logs and detection of bruteforce attacks
Secure Socket Shell (SSH) allows users to connect and access the system remotely through
a publicly exposed interface. These systems often become the target of attacks where an …
a publicly exposed interface. These systems often become the target of attacks where an …
PyComm: Malicious commands detection model for python scripts
A Zhou, T Huang, C Huang, D Li… - Journal of Intelligent & …, 2022 - content.iospress.com
Python is a concise language which can be used to build lightweight tools or dynamic object-
orientated applications. The various attributes of Python have made it attractive to numerous …
orientated applications. The various attributes of Python have made it attractive to numerous …
Cyber security threat intelligence monitoring and classification
BX Wang, JL Chen, CL Yu - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The remote control is widely used for its convenience and its support of resource sharing.
However, it can be exploited by hackers. This work aims to prevent remote network threats …
However, it can be exploited by hackers. This work aims to prevent remote network threats …
[PDF][PDF] Machine learning classifiers in honeynets: a critical review
B Baker, Q Kelsey, P Jason - International Research Journal of …, 2020 - academia.edu
In this paper, we present a critical review of machine learning classifiers applied to honeynet
logs. A honeypot is a deceptive technology used to study adversary behavior during …
logs. A honeypot is a deceptive technology used to study adversary behavior during …
IoT マルウェア自動検知のための悪性コマンド列の特徴に対する概念ドリフト検出
小川真聖, 松井俊浩 - 研究報告マルチメディア通信と分散処理 (DPS …, 2021 - ipsj.ixsq.nii.ac.jp
論文抄録 **年, IoT マルウェアの増加が深刻な脅威になっている. この脅威に対して機械学習を
活用した IoT マルウェア検知の研究が多くなされている. しかし, 機械学習システムには …
活用した IoT マルウェア検知の研究が多くなされている. しかし, 機械学習システムには …
[PDF][PDF] Identification of malicious ssh network activities using honeynet
GK Sadasivam - 2020 - dspace.bits-pilani.ac.in
The objective of this thesis is to identify malicious SSH (Secure Shell) activities using
honeypot traffic. The malicious activities are identified using Machine Learning algorithms …
honeypot traffic. The malicious activities are identified using Machine Learning algorithms …