Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …
researchers and practitioners alike. The ever increasing sophistication of modern …
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Performance evaluation of Botnet DDoS attack detection using machine learning
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …
Blockchain meets covert communication: A survey
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …
prevent the exposure of communication behaviors. Blockchain-based covert communication …
Detecting Denial of Service attacks using machine learning algorithms
Abstract Currently, Distributed Denial of Service Attacks are the most dangerous cyber
danger. By inhibiting the server's ability to provide resources to genuine customers, the …
danger. By inhibiting the server's ability to provide resources to genuine customers, the …
10 years of IoT malware: A feature-based taxonomy
Over the past decade, there has been a rapidly growing interest in IoT-connected devices.
But as is usually the case with computer systems and networks, malicious individuals soon …
But as is usually the case with computer systems and networks, malicious individuals soon …
Ransomware as a service using smart contracts and IPFS
Decentralized systems, such as distributed ledgers and the InterPlanetary File System
(IPFS), are designed to offer more open and robust services. However, they also create …
(IPFS), are designed to offer more open and robust services. However, they also create …
Machine learning approaches for ddos attack detection: Naive bayes vs logistic regression
DDoS assaults are one of the biggest cyber threats. These attacks flood servers with
malicious traffic to prevent them from serving legitimate users. In this case, the server's …
malicious traffic to prevent them from serving legitimate users. In this case, the server's …
A survey of key technologies for constructing network covert channel
J Tian, G **ong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …
channel has become a hot research topic. It refers to an information channel in which the …
Hydras and IPFS: a decentralised playground for malware
Modern malware can take various forms and has reached a very high level of sophistication
in terms of its penetration, persistence, communication and hiding capabilities. The use of …
in terms of its penetration, persistence, communication and hiding capabilities. The use of …