Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations
HA Noman, OMF Abu-Sharkh - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has transformed various domains in our lives by enabling
seamless communication and data exchange between interconnected devices …
seamless communication and data exchange between interconnected devices …
The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
Modeling realistic adversarial attacks against network intrusion detection systems
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …
creating novel defensive opportunities but also new types of risks. Multiple researches have …
Insomnia: Towards concept-drift robustness in network intrusion detection
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
Sok: Pragmatic assessment of machine learning for network intrusion detection
G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Survivable zero trust for cloud computing environments
The security model relying on the traditional defense of the perimeter cannot protect modern
dynamic organizations. The emerging paradigm called zero trust proposes a modern …
dynamic organizations. The emerging paradigm called zero trust proposes a modern …
Addressing adversarial attacks against security systems based on machine learning
Machine-learning solutions are successfully adopted in multiple contexts but the application
of these techniques to the cyber security domain is complex and still immature. Among the …
of these techniques to the cyber security domain is complex and still immature. Among the …
A systematic map** study on intrusion alert analysis in intrusion detection systems
AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …
systems. In recent decades, many research communities have been working in this field …
Evading botnet detectors based on flows and random forest with adversarial samples
G Apruzzese, M Colajanni - 2018 IEEE 17th International …, 2018 - ieeexplore.ieee.org
Machine learning is increasingly adopted for a wide array of applications, due to its
promising results and autonomous capabilities. However, recent research efforts have …
promising results and autonomous capabilities. However, recent research efforts have …