Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important
than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly …
than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly …
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
With the rapid expansion of Internet of Things (IoT) networks, the need for robust security
measures to detect and report potential threats is becoming more urgent. In this paper, we …
measures to detect and report potential threats is becoming more urgent. In this paper, we …
[HTML][HTML] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Network security is essential to our daily communications and networks. Cybersecurity
researchers initiate the significance of emerging proficient network intrusion detection …
researchers initiate the significance of emerging proficient network intrusion detection …
Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection
Recent years have witnessed an in-depth proliferation of the Internet of Things (IoT) and
Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing …
Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing …
A hybrid meta-heuristics algorithm: Xgboost-based approach for ids in iot
In recent years, the importance of the Internet of Things (IoT) and its applications has
increased. IoT networks are diverse, allowing for various real-time applications and making …
increased. IoT networks are diverse, allowing for various real-time applications and making …
Passive rule-based approach to detect sinkhole attack in RPL-based Internet of Things networks
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …
Leveraging metaheuristics for feature selection with machine learning classification for malicious packet detection in computer networks
Robust Intrusion Detection Systems (IDS) are increasingly necessary in the age of big data
due to the growing volume, velocity, and variety of data generated by modern networks …
due to the growing volume, velocity, and variety of data generated by modern networks …
AI-driven improvement of monthly average rainfall forecasting in Mecca using grid search optimization for LSTM networks
F Alqahtani - Journal of Water and Climate Change, 2024 - iwaponline.com
Predicting the average monthly rainfall in Mecca is crucial for sustainable development,
resource management, and infrastructure protection in the region. This study aims to …
resource management, and infrastructure protection in the region. This study aims to …
Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture.
The function of network intrusion detection systems (NIDS) in protecting networks from
cyberattacks is crucial. Many of the more conventional techniques rely on signature-based …
cyberattacks is crucial. Many of the more conventional techniques rely on signature-based …
A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2
T Liu, Y Fu, K Wang, X Duan, Q Wu - Computers & Security, 2025 - Elsevier
As an important network defense approach, network intrusion detection is mainly used to
identify anomaly traffic behavior. However, dominant network intrusion detection …
identify anomaly traffic behavior. However, dominant network intrusion detection …