Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Handling webshell attacks: A systematic map** and survey
In recent years, there has been a significant increase in research interest in webshell
attacks. Webshells are pieces of code that can be written in different scripting languages …
attacks. Webshells are pieces of code that can be written in different scripting languages …
Research and application of artificial intelligence based webshell detection model: A literature review
M Ma, L Han, C Zhou - arxiv preprint arxiv:2405.00066, 2024 - arxiv.org
Webshell, as the" culprit" behind numerous network attacks, is one of the research hotspots
in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of …
in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of …
[HTML][HTML] Malicious webshell family dataset for webshell multi-classification research
Y Zhao, S Lv, W Long, Y Fan, J Yuan, H Jiang, F Zhou - Visual Informatics, 2024 - Elsevier
Malicious webshells currently present tremendous threats to cloud security. Most relevant
studies and open webshell datasets consider malicious webshell defense as a binary …
studies and open webshell datasets consider malicious webshell defense as a binary …
[HTML][HTML] Improving the accuracy of flood susceptibility prediction by combining machine learning models and the expanded flood inventory data
H Yu, Z Luo, L Wang, X Ding, S Wang - Remote Sensing, 2023 - mdpi.com
Sufficient historical flood inventory data (FID) are crucial for accurately predicting flood
susceptibility using supervised machine learning models. However, historical FID are …
susceptibility using supervised machine learning models. However, historical FID are …
PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks
B **e, Q Li, Y Wang - Computers & Security, 2024 - Elsevier
Malicious webshells are the most common attack scripts used by attackers in web
penetration. Attackers typically obfuscate strings of PHP-based malicious webshells and …
penetration. Attackers typically obfuscate strings of PHP-based malicious webshells and …
A DDoS attack detection method based on natural selection of features and models
R Ma, X Chen, R Zhai - Electronics, 2023 - mdpi.com
Distributed Denial of Service (DDoS) is still one of the main threats to network security today.
Attackers are able to run DDoS in simple steps and with high efficiency to slow down or …
Attackers are able to run DDoS in simple steps and with high efficiency to slow down or …
Mistrust Plugins You Must: A {Large-Scale} Study Of Malicious Plugins In {WordPress} Marketplaces
Modern websites owe most of their aesthetics and functionalities to Content Management
Systems (CMS) plugins, which are bought and sold on widely popular marketplaces. Driven …
Systems (CMS) plugins, which are bought and sold on widely popular marketplaces. Driven …
A deep learner model for multi-language webshell detection
Webshell attacks are becoming more and more prevalent every year. Webshells are
malicious scripts injected into web servers in the aim to confiscate persistent and remote …
malicious scripts injected into web servers in the aim to confiscate persistent and remote …
Security analysis and threats detection techniques on docker container
D Huang, H Cui, S Wen… - 2019 IEEE 5th International …, 2019 - ieeexplore.ieee.org
Docker container technology is an emerging virtualization technology which has a very high
efficiency in the phases of development and deployment. Although Docker container …
efficiency in the phases of development and deployment. Although Docker container …
An efficient hybrid webshell detection method for webserver of marine transportation systems
HV Le, TN Nguyen, HN Nguyen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
An increase in the number of Maritime Intelligent Transport Systems (MITSs) also means an
increase in the number of information security risks. Usually, the administration and …
increase in the number of information security risks. Usually, the administration and …