找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen

[復(fù)制鏈接]
樓主: centipede
11#
發(fā)表于 2025-3-23 10:59:25 | 只看該作者
12#
發(fā)表于 2025-3-23 16:56:03 | 只看該作者
A Data Mining Based Analysis of Nmap Operating System Fingerprint Databaseentation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.
13#
發(fā)表于 2025-3-23 21:18:32 | 只看該作者
14#
發(fā)表于 2025-3-24 01:29:32 | 只看該作者
Text Clustering for Digital Forensics Analysisls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.
15#
發(fā)表于 2025-3-24 05:22:13 | 只看該作者
Fuzzy Rule Based Intelligent Security and Fire Detector Systemching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.
16#
發(fā)表于 2025-3-24 08:00:48 | 只看該作者
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identificationptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.
17#
發(fā)表于 2025-3-24 13:23:09 | 只看該作者
18#
發(fā)表于 2025-3-24 15:36:13 | 只看該作者
Conference proceedings 2009in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the d
19#
發(fā)表于 2025-3-24 21:33:44 | 只看該作者
Strategische Entwicklung von Sportvereinenlated with success. In this paper, we present a real framework for vanets that use wireless communication among vehicles and RFID for different traffic signalling information, such as bus stop or semaphore location, speed limit information, etc.
20#
發(fā)表于 2025-3-25 02:30:38 | 只看該作者
https://doi.org/10.1007/978-3-322-86904-3he administrator is guided to provide the missing data. The configurations generated by our approach are represented in a vendor-independent format and therefore can be used with several real devices.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 20:30
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
济阳县| 涡阳县| 和静县| 高安市| 乌拉特后旗| 海淀区| 改则县| 民乐县| 三门峡市| 怀远县| 汉中市| 姚安县| 北安市| 汨罗市| 寿阳县| 赫章县| 旌德县| 耒阳市| 张掖市| 双江| 鲜城| 安仁县| 长宁县| 正宁县| 肇州县| 东明县| 达孜县| 天水市| 巴林右旗| 蕉岭县| 新巴尔虎左旗| 济源市| 黔江区| 巴青县| 湄潭县| 库尔勒市| 汝阳县| 蛟河市| 新巴尔虎左旗| 博爱县| 广饶县|