Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The security of big data in fog-enabled IoT applications including blockchain: A survey
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
Detection of advanced persistent threat using machine-learning correlation analysis
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have
caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with …
caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with …
Systematic literature review on the state of the art and future research work in anonymous communications systems
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …
covered by privacy, we can highlight how to establish anonymous communications. During …
Hidden Markov models and alert correlations for the prediction of advanced persistent threats
Cyber security has become a matter of a global interest, and several attacks target industrial
companies and governmental organizations. The advanced persistent threats (APTs) have …
companies and governmental organizations. The advanced persistent threats (APTs) have …
Botdet: A system for real time botnet command and control traffic detection
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …
A new hybrid machine learning for cybersecurity threat detection based on adaptive boosting
ABSTRACT A hybrid machine learning is a combination of multiple types of machine
learning algorithms for improving the performance of single classifiers. Currently, cyber …
learning algorithms for improving the performance of single classifiers. Currently, cyber …
Machine learning approach for detection of nontor traffic
Intrusion detection has attracted a considerable interest from researchers and industries.
After many years of research the community still faces the problem of building reliable and …
After many years of research the community still faces the problem of building reliable and …
Anomaly detection using dynamic time war**
Analyzing network traffic behavior is essential for detecting network anomalies. However, it
remains a challenge to effectively analyze this behavior for anomaly diagnosis. One …
remains a challenge to effectively analyze this behavior for anomaly diagnosis. One …
Malicious ssl certificate detection: A step towards advanced persistent threat defence
Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is
a new and more complex version of multistep attack. Within the APT life cycle, continuous …
a new and more complex version of multistep attack. Within the APT life cycle, continuous …
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat
In recent years, cyber attacks have caused substantial financial losses and been able to stop
fundamental public services. Among the serious attacks, Advanced Persistent Threat (APT) …
fundamental public services. Among the serious attacks, Advanced Persistent Threat (APT) …