Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
A survey on device fingerprinting approach for resource-constraint IoT devices: Comparative study and research challenges
RR Chowdhury, PE Abas - Internet of Things, 2022 - Elsevier
Modernization and technological advancement have made smart and convenient living
environments, including smart houses and smart cities, possible, by combining the Internet …
environments, including smart houses and smart cities, possible, by combining the Internet …
Application of a dynamic line graph neural network for intrusion detection with semisupervised learning
G Duan, H Lv, H Wang, G Feng - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deep learning (DL) greatly enhances binary anomaly detection capabilities through effective
statistical network characterization; nevertheless, the intrusion class differentiation …
statistical network characterization; nevertheless, the intrusion class differentiation …
Machine learning for the detection and identification of Internet of Things devices: A survey
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …
variety of emerging services and applications. However, the presence of rogue IoT devices …
A survey of smart home iot device classification using machine learning-based network traffic analysis
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size-
fits-all network administration is ineffective because of the diverse QoS requirements of IoT …
fits-all network administration is ineffective because of the diverse QoS requirements of IoT …
An llm-based framework for fingerprinting internet-connected devices
In this paper we propose the use of large language models (LLMs) for characterizing,
clustering, and fingerprinting raw text obtained from network measurements. To this end, We …
clustering, and fingerprinting raw text obtained from network measurements. To this end, We …
IoTDevID: A behavior-based device identification method for the IoT
Device identification (DI) is one way to secure a network of Internet of Things (IoT) devices,
whereby devices identified as suspicious can subsequently be isolated from a network. In …
whereby devices identified as suspicious can subsequently be isolated from a network. In …
Locality-sensitive iot network traffic fingerprinting for device identification
B Charyyev, MH Gunes - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Engineered systems get smarter with computing capabilities, particularly through a multitude
of Internet-of-Things (IoT) devices. IoT devices, however, are prone to be compromised as …
of Internet-of-Things (IoT) devices. IoT devices, however, are prone to be compromised as …
Amir: Active multimodal interaction recognition from video and network traffic in connected environments
Activity recognition using video data is widely adopted for elder care, monitoring for safety
and security, and home automation. Unfortunately, using video data as the basis for activity …
and security, and home automation. Unfortunately, using video data as the basis for activity …
IoT-ID: robust IoT device identification based on feature drift adaptation
Internet of Things (IoT) devices deployed in publicly accessible locations increasingly
encounter security threats from device replacement and impersonation attacks …
encounter security threats from device replacement and impersonation attacks …