Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects
IH Sarker - Annals of Data Science, 2023 - Springer
Due to the digitization and Internet of Things revolutions, the present electronic world has a
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …
[HTML][HTML] A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
Context There are many datasets for training and evaluating models to detect web attacks,
labeling each request as normal or attack. Web attack protection tools must provide …
labeling each request as normal or attack. Web attack protection tools must provide …
Robust data driven analysis for electricity theft attack-resilient power grid
The role of electricity theft detection (ETD) is critical to maintain cost-efficiency in smart grids.
However, existing ETD methods cannot efficiently handle the sheer volume of data now …
However, existing ETD methods cannot efficiently handle the sheer volume of data now …
Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities
Electricity theft (ET) causes major revenue loss in power utilities. It reduces the quality of
supply, raises production cost, causes legal consumers to pay the higher cost, and impacts …
supply, raises production cost, causes legal consumers to pay the higher cost, and impacts …
Brightbox—a rough set based technology for diagnosing mistakes of machine learning models
The paper presents a novel approach to investigating mistakes in machine learning model
operations. The considered approach is the basis for BrightBox–a diagnostic technology that …
operations. The considered approach is the basis for BrightBox–a diagnostic technology that …
Zero-touch security management for mMTC network slices: DDoS attack detection and mitigation
Massive machine-type communications (mMTCs) network slices in 5G aim to connect a
massive number of MTC devices, opening the door for a widened attack surface. Network …
massive number of MTC devices, opening the door for a widened attack surface. Network …
IEEE BigData 2019 cup: Suspicious network event recognition
A Janusz, D Kałuza… - … Conference on Big …, 2019 - ieeexplore.ieee.org
“IEEE BigData 2019 Cup: Suspicious Network Event Recognition” was a data mining
competition organized jointly by companies Security On-Demand and QED Software at the …
competition organized jointly by companies Security On-Demand and QED Software at the …
IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution
SA Alshaya - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Over the past few years, there has been an undeniable surge in the deployment of IoT
devices. However, this rapid growth has brought new challenges in cybersecurity, as …
devices. However, this rapid growth has brought new challenges in cybersecurity, as …
Navigating the Complexities of Cyber Threats, Sentiment, and Health with AI/ML
When it comes to interactions that occur in the contemporary global environment
characterized by increased use of computers and information technology, cybersecurity …
characterized by increased use of computers and information technology, cybersecurity …
A combination of general and specific models to predict victories in video games
QH Vu, D Ruta, L Cen, M Liu - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
At anytime in a tactics game, given the current status of the game players, it's always
interesting to predict who is going to win the game in the end. This is the challenge defined …
interesting to predict who is going to win the game in the end. This is the challenge defined …