咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 19 篇 电气工程
    • 16 篇 软件工程
    • 8 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 土木工程
    • 1 篇 建筑学
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 19 篇 computational mo...
  • 16 篇 intrusion detect...
  • 14 篇 data security
  • 11 篇 testing
  • 10 篇 military computi...
  • 9 篇 computer securit...
  • 9 篇 data mining
  • 8 篇 monitoring
  • 8 篇 artificial intel...
  • 8 篇 training
  • 7 篇 particle swarm o...
  • 7 篇 feature extracti...
  • 7 篇 information secu...
  • 6 篇 computer archite...
  • 6 篇 optimization
  • 6 篇 decision making
  • 6 篇 algorithm design...
  • 6 篇 surveillance

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 department of co...
  • 2 篇 larus technologi...
  • 2 篇 air force resear...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 virginia tech bl...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...

作者

  • 4 篇 a. nur zincir-he...
  • 4 篇 abielmona rami
  • 3 篇 alexander h. lev...
  • 2 篇 jean berger
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 chris thornton
  • 2 篇 trevor martin
  • 2 篇 anna t. lawnicza...
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 malcolm i. heywo...
  • 2 篇 philip hingston

语言

  • 147 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA"
149 条 记 录,以下是1-10 订阅
排序:
2015 ieee symposium on computational intelligence for security and defense applications, cisda 2015 - Proceedings
2015 IEEE Symposium on Computational Intelligence for Securi...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, cisda 2015
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dyn...
来源: 评论
Proceedings of the 2014 7th ieee symposium on computational intelligence for security and defense applications, cisda 2014
Proceedings of the 2014 7th IEEE Symposium on Computational ...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications, cisda 2014
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion de...
来源: 评论
Proceedings of the 2013 ieee symposium on computational intelligence for security and defense applications, cisda 2013 - 2013 ieee symposium Series on computational intelligence, SSCI 2013
Proceedings of the 2013 IEEE Symposium on Computational Inte...
收藏 引用
2013 ieee symposium on computational intelligence for security and defense applications, cisda 2013 - 2013 ieee symposium Series on computational intelligence, SSCI 2013
The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of milit...
来源: 评论
Optimizing Batched Small Matrix Multiplication on Multi-core DSP Architecture  22
Optimizing Batched Small Matrix Multiplication on Multi-core...
收藏 引用
22nd ieee International symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Zuo, Xiaohan Xiao, Chunhua Wang, Qinglin Shi, Chen Chongqing University College of Computer Science Chongqing China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing Changsha410073 China National University of Defense Technology Laboratory of Digitizing Software for Frontier Equipment Changsha410073 China
General Matrix Multiplication (GEMM) is a critical computational operation in scientific computing and machine learning domains. While traditional GEMM performs well on large matrices, it is inefficient in terms of da... 详细信息
来源: 评论
Advancing security of Mobile and IOT Devices with AI Threat Detection Strategies
Advancing Security of Mobile and IOT Devices with AI Threat ...
收藏 引用
ieee/ACM International symposium on Big Data Computing (BDC)
作者: Ali Shikai Marymount University USA
Because of their ubiquitous connectivity and major influence on many sectors, mobile devices and the Internet of Things (IoT) are becoming even more vital. Through the app economy and mobile commerce, mobile devices s... 详细信息
来源: 评论
A Spiking Neural Network Based Auto-encoder for Anomaly Detection in Streaming Data
A Spiking Neural Network Based Auto-encoder for Anomaly Dete...
收藏 引用
ieee symposium Series on computational intelligence (ieee SSCI)
作者: Stratton, Peter Wabnitz, Andrew Hamilton, Tara Julia Univ Technol Sch Elect & Data Eng Sydney NSW 2007 Australia Def Sci & Technol Grp Cyber & Elect Warfare Div Edinburgh SA 5111 Australia
Anomaly Detection (AD) is useful for a range of applications including cyber security, health analytics, robotics, defense and big data. Automating the detection of anomalies is necessary to deal with large volumes of... 详细信息
来源: 评论
Artificial intelligence And Machine Learning
Artificial Intelligence And Machine Learning
收藏 引用
2022 ieee Future Networks World Forum, FNWF 2022
作者: Kataria, Deepak Walid, Anwar Daneshmand, Mahmoud Dutta, Ashutosh Enright, Michael A. Gu, Rentao Lackpour, Alex Ramachandran, Prakash Wang, Honggang Chen, Chi-Ming Chng, Baw Darema, Frederica Ip Junction United States Nokia Bell Labs United States Stevens Institute of Technology United States Johns Hopkins University Applied Physics Lab United States Quantum Dimension Inc. United States Bupt China Drexel University United States Dell Technologies United States EOTF India UMass Dartmouth United States United States Bawman Llc United States Info Symbiotic Systems Society United States
In the evolution of artificial intelligence (AI) and machine learning (ML), reasoning, knowledge representation, planning, learning, natural language processing, perception, and the ability to move and manipulate obje... 详细信息
来源: 评论
computational intelligence in Maritime security and defense: Challenges and Opportunities  8
Computational Intelligence in Maritime Security and Defense:...
收藏 引用
8th ieee symposium Series on computational intelligence (ieee SSCI)
作者: Cococcioni, Marco Univ Pisa Dept Informat Engn Largo Lucio Lazzarino 1 I-56122 Pisa Italy
computational intelligence (CI) has a great potential in security & defense (S&D) applications. Nevertheless, such potential seems to be still under exploited. In this work we first review CI applications in t... 详细信息
来源: 评论
Memristive computational Architecture of an Echo State Network for Real-Time Speech-Emotion Recognition
Memristive Computational Architecture of an Echo State Netwo...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (cisda)
作者: Sakti, Qutaiba Merkel, Cory Kudithipudi, Dhireesha Wysocki, Bryant Rochester Inst Technol NanoComputing Res lab Rochester NY 14623 USA US Air Force Res Lab I-13441 Rome NY Italy
Echo state neural networks (ESNs) provide an efficient classification technique for spatiotemporal signals. The feedback connections in the ESN topology enable feature extraction of both spatial and temporal component... 详细信息
来源: 评论
A Trace Abstraction Approach for Host-based Anomaly Detection
A Trace Abstraction Approach for Host-based Anomaly Detectio...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (cisda)
作者: Murtaza, Syed Shariyar Khreich, Wael Hamou-Lhadj, Abdelwahab Gagnon, Stephane Concordia Univ ECE SBA Res Lab Montreal PQ Canada Univ Quebec Outaouais Dept Sci Adm Gatineau PQ Canada
High false alarm rates and execution times are among the key issues in host-based anomaly detection systems. In this paper, we investigate the use of trace abstraction techniques for reducing the execution time of ano... 详细信息
来源: 评论