Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey and taxonomy of the fuzzy signature-based intrusion detection systems
M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …
experts are seriously considering artificial intelligence as a potential field that can aid …
Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
ABSTRACT Network Intrusion Detection System (NIDS) is often used to classify network
traffic in an attempt to protect computer systems from various network attacks. A major …
traffic in an attempt to protect computer systems from various network attacks. A major …
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …
cyber‐attacks are created every day as means for achieving financial gain, imposing …
Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures
Wireless sensor networks have become integral components of the monitoring systems for
critical infrastructures such as the power grid or residential microgrids. Therefore …
critical infrastructures such as the power grid or residential microgrids. Therefore …
Anomaly-based intrusion detection system using fuzzy logic
Recently, the Distributed Denial of Service (DDOS) attacks has been used for different
aspects to denial the number of services for the end-users. Therefore, there is an urgent …
aspects to denial the number of services for the end-users. Therefore, there is an urgent …
Intrusion detection using Highest Wins feature selection algorithm
The rapid advancement of Internet stimulates building intelligent data mining systems for
detecting intrusion attacks. The performance of such systems might be negatively affected …
detecting intrusion attacks. The performance of such systems might be negatively affected …
Enhanced cloud security: A novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier
The cloud computing environment faces significant security challenges, impacting its long-
term growth. Intrusion detection is crucial for mitigating potential threats in this domain …
term growth. Intrusion detection is crucial for mitigating potential threats in this domain …
On detecting distributed denial of service attacks using fuzzy inference system
Nowadays, attackers are constantly targeting the modern aspects of technology and
attempting to abuse these technologies using different attacks types such as the distributed …
attempting to abuse these technologies using different attacks types such as the distributed …
Intrusion detection mechanism using fuzzy rule interpolation
Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated) conclusions even
in case if some situations are not explicitly defined in a fuzzy rule based knowledge …
in case if some situations are not explicitly defined in a fuzzy rule based knowledge …