Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of security and privacy concerns in the internet of things (IoT)
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …
applications. There are more than 50 billion devices connected globally. IoT applications' …
A review and analysis of the bot-iot dataset
Machine learning is rapidly changing the cybersecu-rity landscape. The use of predictive
models to detect malicious activity and identify inscrutable attack patterns is providing levels …
models to detect malicious activity and identify inscrutable attack patterns is providing levels …
A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network
Abstract The Internet of Things (IoT) is emerging as a new technology for the development of
various critical applications. However, these applications are still working on centralized …
various critical applications. However, these applications are still working on centralized …
A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system
Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to
improve the traditional transport management systems. In C-ITS infrastructure Autonomous …
improve the traditional transport management systems. In C-ITS infrastructure Autonomous …
smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
[HTML][HTML] A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Abstract Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due
to insecure wireless communication, resource constraint architecture, different types of IoT …
to insecure wireless communication, resource constraint architecture, different types of IoT …
Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …
BDEdge: Blockchain and deep-learning for secure edge-envisioned green CAVs
Green Connected and Autonomous Vehicles (CAVs) are the future of next-generation
Intelligent Transportation Systems (ITS) that will help humans to improve road safety and …
Intelligent Transportation Systems (ITS) that will help humans to improve road safety and …
DLTIF: Deep learning-driven cyber threat intelligence modeling and identification framework in IoT-enabled maritime transportation systems
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is
successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the …
successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the …
Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection in iot-enabled networks
Today's technologically advanced connected world is mostly reliant on the Internet of Things
(IoT)-enabled smart gadgets and easy connectivity. These smart gadgets are more …
(IoT)-enabled smart gadgets and easy connectivity. These smart gadgets are more …