Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations
S Saeed, SA Altamimi, NA Alkayyal, E Alshehri… - Sensors, 2023 - mdpi.com
This systematic literature review explores the digital transformation (DT) and cybersecurity
implications for achieving business resilience. DT involves transitioning organizational …
implications for achieving business resilience. DT involves transitioning organizational …
Machine learning for metal additive manufacturing: Towards a physics-informed data-driven paradigm
Abstract Machine learning (ML) has shown to be an effective alternative to physical models
for quality prediction and process optimization of metal additive manufacturing (AM) …
for quality prediction and process optimization of metal additive manufacturing (AM) …
Cybersecurity, data privacy and blockchain: A review
In this paper, we identify and review key challenges to bridge the knowledge-gap between
SME's, companies, organisations, businesses, government institutions and the general …
SME's, companies, organisations, businesses, government institutions and the general …
Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense
Concerns about cybersecurity and attack methods have risen in the information age. Many
techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs) …
techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs) …
When deep learning-based soft sensors encounter reliability challenges: a practical knowledge-guided adversarial attack and its defense
Deep learning-based soft sensors (DLSSs) have been demonstrated to exhibit significantly
improved sensing accuracy; however, their vulnerability to adversarial attacks affects their …
improved sensing accuracy; however, their vulnerability to adversarial attacks affects their …
Modeling realistic adversarial attacks against network intrusion detection systems
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …
creating novel defensive opportunities but also new types of risks. Multiple researches have …
Defense strategies for adversarial machine learning: A survey
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
[HTML][HTML] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
Abstract Machine learning based Intrusion Detection Systems (IDS) allow flexible and
efficient automated detection of cyberattacks in Internet of Things (IoT) networks. However …
efficient automated detection of cyberattacks in Internet of Things (IoT) networks. However …
[HTML][HTML] SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection
Abstract Machine Learning (ML) can be incredibly valuable to automate anomaly detection
and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is …
and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is …
[HTML][HTML] Adversarial machine learning in industry: A systematic literature review
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …