Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[책][B] Non-functional requirements in software engineering
Non-Functional Requirements in Software Engineering presents a systematic and pragmatic
approach tobuilding quality into'software systems. Systems must exhibit software quality …
approach tobuilding quality into'software systems. Systems must exhibit software quality …
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf… - Proceedings DARPA …, 2000 - ieeexplore.ieee.org
An intrusion detection evaluation test bed was developed which generated normal traffic
similar to that on a government site containing 100's of users on 1000's of hosts. More than …
similar to that on a government site containing 100's of users on 1000's of hosts. More than …
Self-efficacy in information security: Its influence on end users' information security practice behavior
HS Rhee, C Kim, YU Ryu - Computers & security, 2009 - Elsevier
The ultimate success of information security depends on appropriate information security
practice behaviors by the end users. Based on social cognitive theory, this study models and …
practice behaviors by the end users. Based on social cognitive theory, this study models and …
A database of computer attacks for the evaluation of intrusion detection systems
KKR Kendall - 1999 - dspace.mit.edu
The 1998 DARPA intrusion detection evaluation created the first standard corpus for
evaluating computer intrusion detection systems. This corpus was designed to evaluate both …
evaluating computer intrusion detection systems. This corpus was designed to evaluate both …
[PDF][PDF] A markov chain model of temporal behavior for anomaly detection
N Ye - Proceedings of the 2000 IEEE Systems, Man, and …, 2000 - Citeseer
This paper presents an anomaly detection technique to detect intrusions into computer and
network systems. In this technique, a Markov chain model is used to represent a temporal …
network systems. In this technique, a Markov chain model is used to represent a temporal …
Improving intrusion detection performance using keyword selection and neural networks
The most common computer intrusion detection systems detect signatures of known attacks
by searching for attack-specific keywords in network traffic. Many of these systems suffer …
by searching for attack-specific keywords in network traffic. Many of these systems suffer …
Critical analysis of different approaches to minimizing user‐related faults in information systems security: implications for research and practice
MT Siponen - Information Management & Computer Security, 2000 - emerald.com
Even though the human component has been recognized to have a crucial role in
information systems (IS) security, the human issues have not received much attention …
information systems (IS) security, the human issues have not received much attention …
Internet security: malicious e‐mails detection and protection
S Dong‐Her, C Hsiu‐Sen, C Chun‐Yuan… - Industrial Management & …, 2004 - emerald.com
New malicious e‐mails are created at the rate of thousands a year and pose a serious
security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail …
security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail …
Corporate system security: towards an integrated management approach
H Ngo Higgins - Information Management & Computer Security, 1999 - emerald.com
This paper discusses an integrated security approach that engages multiple functional
levels in an organization from the Board and management to IT staff and individual users …
levels in an organization from the Board and management to IT staff and individual users …
Modeling intrusion detection system by discovering association rule in rough set theory framework
W Xuren, H Famei, X Rongsheng - … International Conference on …, 2006 - ieeexplore.ieee.org
In Intrusion Detection Systems, many intelligent information processing methods, data
miming technology and so on have been applied to generating attack signatures …
miming technology and so on have been applied to generating attack signatures …