Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
A survey and taxonomy of the fuzzy signature-based intrusion detection systems
M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset
The effectiveness of machine learning models can be significantly averse to redundant and
irrelevant features present in the large dataset which can cause drastic performance …
irrelevant features present in the large dataset which can cause drastic performance …
Intrusion detection system: A comprehensive review
HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of network and computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …
detection systems (IDSs) has received a lot of attention throughout the computer science …
A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Taxonomy and survey of collaborative intrusion detection
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
Host-based intrusion detection system with system calls: Review and future trends
M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …
system call traces, which are not suitable for traditional host-based intrusion detection …
An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
An intrusion detection system using network traffic profiling and online sequential extreme learning machine
Abstract Anomaly based Intrusion Detection Systems (IDS) learn normal and anomalous
behavior by analyzing network traffic in various benchmark datasets. Common challenges …
behavior by analyzing network traffic in various benchmark datasets. Common challenges …
Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …
necessity to help safeguard personal and organizational assets. However, with the …