Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …
technology in the manufacturing sector with consideration for offensive and defensive uses …
A guided tour to approximate string matching
G Navarro - ACM computing surveys (CSUR), 2001 - dl.acm.org
We survey the current techniques to cope with the problem of string matching that allows
errors. This is becoming a more and more relevant issue for many fast growing areas such …
errors. This is becoming a more and more relevant issue for many fast growing areas such …
Statistical fraud detection: A review
RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
Combating dependence explosion in forensic analysis using alternative tag propagation semantics
We are witnessing a rapid escalation in targeted cyber-attacks called Advanced and
Persistent Threats (APTs). Carried out by skilled adversaries, these attacks take place over …
Persistent Threats (APTs). Carried out by skilled adversaries, these attacks take place over …
Effective detection of sophisticated online banking fraud on extremely imbalanced data
Sophisticated online banking fraud reflects the integrative abuse of resources in social,
cyber and physical worlds. Its detection is a typical use case of the broad-based Wisdom …
cyber and physical worlds. Its detection is a typical use case of the broad-based Wisdom …
Intrusion detection using sequences of system calls
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …
is given that short sequences of system calls executed by running processes are a good …
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
Towards a taxonomy of intrusion-detection systems
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …
networks, or against information systems in general, as it is difficult to provide provably …
[PDF][PDF] Intrusion detection systems: A survey and taxonomy
S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …
and classify a number of research prototypes. The taxonomy consists of a classification first …
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
With increasing Internet connectivity and traffic volume, recent intrusion incidents have
reemphasized the importance of network intrusion detection systems for combating …
reemphasized the importance of network intrusion detection systems for combating …