Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning models for digital image processing: a review
R Archana, PSE Jeevaraj - Artificial Intelligence Review, 2024 - Springer
Within the domain of image processing, a wide array of methodologies is dedicated to tasks
including denoising, enhancement, segmentation, feature extraction, and classification …
including denoising, enhancement, segmentation, feature extraction, and classification …
Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
[HTML][HTML] A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework
SM Kasongo - Computer Communications, 2023 - Elsevier
In recent years, the spike in the amount of information transmitted through communication
infrastructures has increased due to the advances in technologies such as cloud computing …
infrastructures has increased due to the advances in technologies such as cloud computing …
Anomaly based network intrusion detection for IoT attacks using deep learning technique
Abstract Internet of Things (IoT) applications are growing in popularity for being widely used
in many real-world services. In an IoT ecosystem, many devices are connected with each …
in many real-world services. In an IoT ecosystem, many devices are connected with each …
Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset
The effectiveness of machine learning models can be significantly averse to redundant and
irrelevant features present in the large dataset which can cause drastic performance …
irrelevant features present in the large dataset which can cause drastic performance …
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach
Abstract The Internet of Things (IoT) is currently seeing tremendous growth due to new
technologies and big data. Research in the field of IoT security is an emerging topic. IoT …
technologies and big data. Research in the field of IoT security is an emerging topic. IoT …
Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS)
play a critical role in protecting interconnected networks by detecting malicious actors and …
play a critical role in protecting interconnected networks by detecting malicious actors and …
A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction
Due to sharp increases in data dimensions, working on every data mining or machine
learning (ML) task requires more efficient techniques to get the desired results. Therefore, in …
learning (ML) task requires more efficient techniques to get the desired results. Therefore, in …
Machine learning methods for cyber security intrusion detection: Datasets and comparative study
The increase in internet usage brings security problems with it. Malicious software can affect
the operation of the systems and disrupt data confidentiality due to the security gaps in the …
the operation of the systems and disrupt data confidentiality due to the security gaps in the …