咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 39 篇 计算机科学与技术...
    • 15 篇 软件工程
    • 14 篇 电气工程
    • 9 篇 控制科学与工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 3 篇 土木工程
    • 3 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 冶金工程
    • 1 篇 建筑学
    • 1 篇 航空宇航科学与技...
    • 1 篇 核科学与技术
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 9 篇 理学
    • 6 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 18 篇 intrusion detect...
  • 14 篇 data security
  • 12 篇 testing
  • 10 篇 computer securit...
  • 9 篇 military computi...
  • 9 篇 artificial intel...
  • 8 篇 data mining
  • 8 篇 monitoring
  • 8 篇 computational mo...
  • 7 篇 particle swarm o...
  • 7 篇 surveillance
  • 7 篇 information secu...
  • 7 篇 detectors
  • 7 篇 training
  • 6 篇 genetic programm...
  • 6 篇 algorithm design...
  • 6 篇 humans
  • 5 篇 application soft...

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 air force resear...
  • 2 篇 faculty of compu...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 department of co...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...
  • 1 篇 ece department s...

作者

  • 5 篇 a. nur zincir-he...
  • 3 篇 malcolm i. heywo...
  • 3 篇 alexander h. lev...
  • 3 篇 abielmona rami
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 h. gunes kayacik
  • 2 篇 chris thornton
  • 2 篇 stefan burschka
  • 2 篇 trevor martin
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 philip hingston

语言

  • 128 篇 英文
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009"
129 条 记 录,以下是1-10 订阅
排序:
ieee symposium on computational intelligence for security and defense applications, cisda 2009
IEEE Symposium on Computational Intelligence for Security an...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, cisda 2009
The proceedings contain 48 papers. The topics discussed include: a framework for the design of a military operational supply network;local feature analysis for robust face recognition;minimizing risk on a fleet mix pr...
来源: 评论
Proceedings of the 2013 ieee symposium on computational intelligence for security and defense applications, cisda 2013 - 2013 ieee symposium Series on computational intelligence, SSCI 2013
Proceedings of the 2013 IEEE Symposium on Computational Inte...
收藏 引用
2013 ieee symposium on computational intelligence for security and defense applications, cisda 2013 - 2013 ieee symposium Series on computational intelligence, SSCI 2013
The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of milit...
来源: 评论
ieee SSCI 2011 - symposium Series on computational intelligence - cisda 2011: 2011 ieee symposium on computational intelligence for security and defense applications
IEEE SSCI 2011 - Symposium Series on Computational Intellige...
收藏 引用
symposium Series on computational intelligence, ieee SSCI 2011 - 2011 ieee symposium on computational intelligence for security and defense applications, cisda 2011
The proceedings contain 17 papers. The topics discussed include: optimising multistatic sensor locations using path planning and game theory;rapid prototyping of high performance fuzzy computing applications using hig...
来源: 评论
Proceeding of the 2007 ieee symposium on computational intelligence in security and defense applications, cisda 2007
Proceeding of the 2007 IEEE Symposium on Computational Intel...
收藏 引用
2007 ieee symposium on computational intelligence in security and defense applications, cisda 2007
The proceedings contain 29 papers. The topics discussed include: toward open-set text-independent speaker identification in tactical communications;the PSO-based adaptive window for people tracking;ATR applications in... 详细信息
来源: 评论
2015 ieee symposium on computational intelligence for security and defense applications, cisda 2015 - Proceedings
2015 IEEE Symposium on Computational Intelligence for Securi...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, cisda 2015
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dyn...
来源: 评论
Proceedings of the 2014 7th ieee symposium on computational intelligence for security and defense applications, cisda 2014
Proceedings of the 2014 7th IEEE Symposium on Computational ...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications, cisda 2014
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion de...
来源: 评论
symposium on computational intelligence for security and defense applications (ieee cisda 2011)
Symposium on Computational Intelligence for Security and Def...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
The 2011 ieee symposium on computational intelligence for security and defense applications will present a wide range of applications to very challenging problems in the security and defense domains. ieee cisda 2011, ...
来源: 评论
ieee symposium on computational intelligence in security and defense applications (cisda 2007)
IEEE Symposium on Computational Intelligence in Security and...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
The following topics are dealt with: computational intelligence; security of data; defense application; military computing; image processing and evolutionary computation
来源: 评论
Investigating Application Behavior in Network Traffic Traces
Investigating Application Behavior in Network Traffic Traces
收藏 引用
ieee symposium on computational intelligence for security and defense applications (cisda)
作者: Foroushani, Vahid Aghaei Zincir-Heywood, A. Nur Dalhousie Univ Fac Comp Sci Halifax NS Canada
Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. This paper presents a machine learning based approach to identify... 详细信息
来源: 评论
Testing A Distributed Denial of Service Defence Mechanism Using Red Teaming
Testing A Distributed Denial of Service Defence Mechanism Us...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (cisda)
作者: Rastegari, Samaneh Hingston, Philip Lam, Chiou-Peng Brand, Murray Edith Cowan Univ Sch Comp & Secur Sci Perth WA 6050 Australia
The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attack... 详细信息
来源: 评论