標(biāo)題: Titlebook: International Joint Conference 15th International Conference on Computational Intelligence in Securi; Proceedings Pablo García Bringas,Hild [打印本頁] 作者: 手或腳 時(shí)間: 2025-3-21 17:45
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi影響因子(影響力)
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi影響因子(影響力)學(xué)科排名
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi網(wǎng)絡(luò)公開度
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi被引頻次
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi被引頻次學(xué)科排名
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi年度引用
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi年度引用學(xué)科排名
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi讀者反饋
書目名稱International Joint Conference 15th International Conference on Computational Intelligence in Securi讀者反饋學(xué)科排名
作者: coltish 時(shí)間: 2025-3-21 23:21 作者: 陰謀小團(tuán)體 時(shí)間: 2025-3-22 01:54
Pablo García Bringas,Hilde Pérez García,Emilio CorPresents the latest research on Computational Intelligence in Security for Information Systems.Includes recent research on European transnational education.Features new applications of computational i作者: 挫敗 時(shí)間: 2025-3-22 07:19
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/471726.jpg作者: Decrepit 時(shí)間: 2025-3-22 12:21 作者: 祖?zhèn)?nbsp; 時(shí)間: 2025-3-22 15:38 作者: 先驅(qū) 時(shí)間: 2025-3-22 18:28
Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Tasktion. The used set of algorithms allowed to show the problem of estimating water prediction from different points of view. Thus, determining the tested systems’ seasonality and short-term and long-term trends. This allowed to choose the two best algorithms, one that needs less computational power to work; this seems to be a better solution.作者: Dappled 時(shí)間: 2025-3-23 00:30
Efficient Implementation of?Stream Cipher SNOW 3G for?Resource-Constrained Devicese equivalent binary model of the LFSRs defined in .. Although SNOW 3G seems ruled out for 5G communications, it is still interesting to have efficient implementations in 4G that allow its integration in devices with limited processors.作者: VEIL 時(shí)間: 2025-3-23 03:16 作者: Assemble 時(shí)間: 2025-3-23 07:40 作者: exquisite 時(shí)間: 2025-3-23 11:00
An Anomaly Detection Approach for?Realtime Identification Systems Based on?Centroidse dynamics difference exceeds a certain threshold, the system classifies it as an anomaly. Otherwise, the centroid is updated by introducing the newly identified data. Finally, the proposed method was tested on a real system, in this case, on the level control plant, obtaining a good performance in anomaly detection.作者: DALLY 時(shí)間: 2025-3-23 14:04
Dimensionality-Reduction Methods for?the?Analysis of?Web Trafficgenerate intuitive visualizations that can support the visual analysis of web traffic. More precisely, Laplacian Eigenmap, Isomap, t-Distributed Stochastic Neighbor Embedding, and Beta Hebbian Learning have been benchmarked. Promising results have been obtained on the standard CSIC2010 v2 dataset, encouraging further research on this topic.作者: Flavouring 時(shí)間: 2025-3-23 22:01
About the?Fujisaki-Okamoto Transformation in?the?Code-Based Algorithms of?the?NIST Post-quantum Callcode-based candidates of the NIST third round. These are Classic McEliece (finalist), BIKE (alternative) and HQC (alternative). Studying the differences between the transformations gives a better understanding of these candidates.作者: 團(tuán)結(jié) 時(shí)間: 2025-3-23 22:47 作者: tangle 時(shí)間: 2025-3-24 03:51 作者: deceive 時(shí)間: 2025-3-24 09:37 作者: 挑剔小責(zé) 時(shí)間: 2025-3-24 13:43
Forecasting the?Number of?Bugs and?Vulnerabilities in?Software Components Using Neural Network Models, which if exploited can become vulnerabilities. This paper presents a comparison of several types of neural networks for forecasting the number of software bugs and vulnerabilities that will be discovered for a software component in certain timeframe, in terms of accuracy, trainability and stability to configuration parameters.作者: 柔聲地說 時(shí)間: 2025-3-24 17:18
2367-3370 ional education.Features new applications of computational i.This book of Lecture Notes in Networks and Systems contains accepted papers presented at the 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) and the 13th International Conference作者: SPURN 時(shí)間: 2025-3-24 20:26
Conference proceedings 2023nce in Security for Information Systems (CISIS 2022) and the 13th International Conference on EUropean Transnational Education (ICEUTE 2022). These conferences were held in the beautiful city of Salamanca, Spain, in September 2022...The aim of the CISIS 2022 conference is to offer a meeting opportun作者: circumvent 時(shí)間: 2025-3-25 02:29 作者: pancreas 時(shí)間: 2025-3-25 07:21 作者: 填料 時(shí)間: 2025-3-25 07:52 作者: Provenance 時(shí)間: 2025-3-25 15:33
Souhila Badra Guendouzi,Samir Ouchani,Mimoun Malkiign Computing and Cognition (DCC’24).Written by experts in t.This book publishes the reviewed and revised texts of the papers delivered at the?.Eleventh. International Conference on Design Computing – DCC’24?.held at Concordia University in Montreal, Canada. These papers span the range of design res作者: inhumane 時(shí)間: 2025-3-25 15:53 作者: ACTIN 時(shí)間: 2025-3-25 23:28
?ukasz Saganowski,Tomasz Andrysiake Chinese bracket sets (Dougong), crucial and complex structural elements in traditional Chinese architecture, lack a well-developed computational design framework for parametric design respecting to this specific style. Existing bracket set solutions are inaccurate due to poor component dimension c作者: 同義聯(lián)想法 時(shí)間: 2025-3-26 03:05 作者: 陪審團(tuán) 時(shí)間: 2025-3-26 06:59
Madiha Harrabi,Olfa Belkahla Driss,Khaled Ghediraworlds and afford different ways of being and working. This paper contextualizes this theory in design by exploring hemispheric dominance during design ideation. Forty engineering professionals ideated solutions to design tasks. Functional near-infrared spectroscopy was used to measure change in oxy作者: 初學(xué)者 時(shí)間: 2025-3-26 09:46 作者: Locale 時(shí)間: 2025-3-26 12:57 作者: 招致 時(shí)間: 2025-3-26 17:23
Miguel ángel González de la Torre,Luis Hernández Encinasworlds and afford different ways of being and working. This paper contextualizes this theory in design by exploring hemispheric dominance during design ideation. Forty engineering professionals ideated solutions to design tasks. Functional near-infrared spectroscopy was used to measure change in oxy作者: 發(fā)酵 時(shí)間: 2025-3-26 21:25
Seiya Otsuka,Hiroki Iimori,Kengo Ando,Giuseppe Thadeu Freitas de Abreu,Koji Ishibashi,Naoki Ishikawaign Computing and Cognition (DCC’24).Written by experts in t.This book publishes the reviewed and revised texts of the papers delivered at the .Tenth International Conference on Design Computing – DCC’24?.held at Concordia University in Montreal, Canada. These papers the range of design research fro作者: fluoroscopy 時(shí)間: 2025-3-27 01:30 作者: 昏暗 時(shí)間: 2025-3-27 08:29 作者: 放逐 時(shí)間: 2025-3-27 11:52
Luis Hernández-álvarez,Juan José Bullón Pérez,Araceli Queiruga-Dioscrogrids, co-phase railway traction supply systems, and underwater electroacoustic transduction systems. In these applications, the adaptive impedance converter models, topologies, and control methods are introduced in this book...Adaptive impedance converters are designed to transform the impedance作者: 不透明 時(shí)間: 2025-3-27 16:09 作者: 重疊 時(shí)間: 2025-3-27 20:52
Rudolf Erdei,Daniela Delinschi,Emil Pa?ca,Oliviu Mateiy, selecting appropriate computing platforms for these applications is done manually through prototyping and benchmarking. To simplify this selection process, Dataflow (DF) modeling has been utilized to identify opportunities for parallelism. This approach utilizes the Algorithm Architecture “Adequa作者: 承認(rèn) 時(shí)間: 2025-3-28 00:14 作者: 媽媽不開心 時(shí)間: 2025-3-28 05:36
Alberto Miranda-García,Ignacio Samuel Crespo-Martínez,ángel Manuel Guerrero-Higueras,Vicente Matellálication domains such as security, multimedia, signal processing, and machine learning. The efficiency of a CGRA is determined by its architectural features and the compiler’s ability to exploit the spatio-temporal configuration. Numerous design optimizations and mapping techniques have been introdu作者: Morose 時(shí)間: 2025-3-28 07:47 作者: 罐里有戒指 時(shí)間: 2025-3-28 11:33 作者: 法律 時(shí)間: 2025-3-28 17:39
Genetic Algorithm Based Aggregation for?Federated Learning in?Industrial Cyber Physical Systemsitutions. These kinds of systems have proved to be very complicated, and it may be a difficult task to get a handle on their architecture and make sure everything works properly. By putting up a framework for federated learning that we’ve dubbed .? the purpose of this study is to address some of the作者: 制造 時(shí)間: 2025-3-28 19:39 作者: 一個(gè)姐姐 時(shí)間: 2025-3-29 02:49
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detectionth the use of a radio sensory network. The structure of the examined measurement network is presented and described. The signals analysed in the article represent selected features of the smart metering network traffic. The initial step involves the use of Isolation Forest algorithm for detection an作者: 鑲嵌細(xì)工 時(shí)間: 2025-3-29 03:42
An Anomaly Detection Approach for?Realtime Identification Systems Based on?Centroidsal is based on combining the real-time identification algorithm, Recursive Least Squares, with a centroid-based methodology. For anomaly detection, the method compares the current system dynamics with the average (centroid) of the dynamics identified in previous states for a specific setpoint. If th作者: Influx 時(shí)間: 2025-3-29 11:09 作者: 箴言 時(shí)間: 2025-3-29 12:34 作者: FILTH 時(shí)間: 2025-3-29 17:23 作者: 蒼白 時(shí)間: 2025-3-29 22:43 作者: buoyant 時(shí)間: 2025-3-30 00:56 作者: Cognizance 時(shí)間: 2025-3-30 07:29 作者: 蝕刻術(shù) 時(shí)間: 2025-3-30 09:35 作者: 放逐某人 時(shí)間: 2025-3-30 12:39 作者: antedate 時(shí)間: 2025-3-30 17:23 作者: 金哥占卜者 時(shí)間: 2025-3-30 23:18
Evaluation of?the?Reliability Index of?IP Addresses in?Reputation Listse the addresses’ reliability in this list to avoid false positives, regardless of the metrics that have been classified as malicious. Reliability is defined as the probability that such IP addresses are a significant threat due to their appearance on different reputation lists. Generating an evaluat作者: Banister 時(shí)間: 2025-3-31 03:17 作者: Hallmark 時(shí)間: 2025-3-31 05:24 作者: 憤世嫉俗者 時(shí)間: 2025-3-31 11:34
G. Cotrina,A. Peinado,A. Ortizentations. The book triangulates qualitative analysis of relevant literature in the fields of e-participation and DT with knowledge from European projects experimenting with public participation activities impl978-3-031-72159-5978-3-031-72160-1Series ISSN 2191-530X Series E-ISSN 2191-5318 作者: 共同生活 時(shí)間: 2025-3-31 15:37 作者: Folklore 時(shí)間: 2025-3-31 18:13 作者: POINT 時(shí)間: 2025-3-31 21:45
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detectioner estimation of the analysed signal and its comparative analysis to network traffic features which are used by maintenance staff. Efficiency of our method is examined with the use of an extended set of test traces from real network traffic. The obtained experimental results confirm effectiveness of作者: Anhydrous 時(shí)間: 2025-4-1 02:23 作者: 違法事實(shí) 時(shí)間: 2025-4-1 09:11