Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
Machine learning has become widely adopted as a strategy for dealing with a variety of
cybersecurity issues, ranging from insider threat detection to intrusion and malware …
cybersecurity issues, ranging from insider threat detection to intrusion and malware …
[HTML][HTML] Cyberattacks in smart grids: challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial …
AA Bouramdane - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Smart grids have emerged as a transformative technology in the power sector, enabling
efficient energy management. However, the increased reliance on digital technologies also …
efficient energy management. However, the increased reliance on digital technologies also …
Black-box adversarial transferability: An empirical study in cybersecurity perspective
The rapid advancement of artificial intelligence within the realm of cybersecurity raises
significant security concerns. The vulnerability of deep learning models in adversarial …
significant security concerns. The vulnerability of deep learning models in adversarial …
A deep and systematic review of the intrusion detection systems in the fog environment
L Yi, M Yin, M Darbandi - Transactions on Emerging …, 2023 - Wiley Online Library
Fog computing has arisen to complement cloud computing, offering a cost‐effective
architecture to power the Internet of things. Fog computing is a network computing and …
architecture to power the Internet of things. Fog computing is a network computing and …
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Abstract Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks
and face challenges such as complex evaluation methods, elevated false positive rates …
and face challenges such as complex evaluation methods, elevated false positive rates …
Better safe than never: A survey on adversarial machine learning applications towards iot environment
Internet of Things (IoT) technologies serve as a backbone of cutting-edge intelligent
systems. Machine Learning (ML) paradigms have been adopted within IoT environments to …
systems. Machine Learning (ML) paradigms have been adopted within IoT environments to …
Unknown, atypical and polymorphic network intrusion detection: A systematic survey
Agile network security is paramount in our modern world which is currently dominated by
Internet systems and expanding digital spaces. This rapid digital transformation has created …
Internet systems and expanding digital spaces. This rapid digital transformation has created …
[HTML][HTML] Mitigation of black-box attacks on intrusion detection systems-based ml
Intrusion detection systems (IDS) are a very vital part of network security, as they can be
used to protect the network from illegal intrusions and communications. To detect malicious …
used to protect the network from illegal intrusions and communications. To detect malicious …
An approach to improve the robustness of machine learning based intrusion detection system models against the carlini-wagner attack
Machine Learning (ML) techniques have been applied over the past two decades to improve
the abilities of Intrusion Detection Systems (IDSs). Over time, several enhancements have …
the abilities of Intrusion Detection Systems (IDSs). Over time, several enhancements have …