咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 19 篇 电气工程
    • 16 篇 软件工程
    • 8 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 土木工程
    • 1 篇 建筑学
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 19 篇 computational mo...
  • 16 篇 intrusion detect...
  • 14 篇 data security
  • 11 篇 testing
  • 10 篇 military computi...
  • 9 篇 computer securit...
  • 9 篇 data mining
  • 8 篇 monitoring
  • 8 篇 artificial intel...
  • 8 篇 training
  • 7 篇 particle swarm o...
  • 7 篇 feature extracti...
  • 7 篇 information secu...
  • 6 篇 computer archite...
  • 6 篇 optimization
  • 6 篇 decision making
  • 6 篇 algorithm design...
  • 6 篇 surveillance

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 department of co...
  • 2 篇 larus technologi...
  • 2 篇 air force resear...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 virginia tech bl...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...

作者

  • 4 篇 a. nur zincir-he...
  • 4 篇 abielmona rami
  • 3 篇 alexander h. lev...
  • 2 篇 jean berger
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 chris thornton
  • 2 篇 trevor martin
  • 2 篇 anna t. lawnicza...
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 malcolm i. heywo...
  • 2 篇 philip hingston

语言

  • 148 篇 英文
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA"
149 条 记 录,以下是91-100 订阅
排序:
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing
Optimizing anomaly detector deployment under evolutionary bl...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Hilmi Güneş Kayacik Nur Zincir-Heywood Malcolm Heywood Stefan Burschka Faculty of Computer Science Dalhousie University Canada Swisscom Innovations Inc. Switzerland
This work focuses on testing anomaly detectors from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly detection systems two capabilities. Firstly, no... 详细信息
来源: 评论
Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT
Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Carson Brown Alex Cowperthwaite Abdulrahman Hijazi Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University Ottawa ONT Canada
The 1999 DARPA/Lincoln Laboratory IDS evaluation data has been widely used in the intrusion detection and networking community, even though it is known to have a number of artifacts. Here we show that many of these ar... 详细信息
来源: 评论
Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior
Testing harbour patrol and interception policies using parti...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Tom Flanagan Chris Thornton Jörg Denzinger Department of Computer Science University of Calgary Calgary Canada
We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm... 详细信息
来源: 评论
New search algorithm for randomly located objects: A non-cooperative agent based approach
New search algorithm for randomly located objects: A non-coo...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Dragos Calitoiu Department of Computer Engineering Carleton University Ottawa Canada
In this paper we address the general question of what is the best strategy to search efficiently for randomly located objects (target sites). We propose a new agent based algorithm for searching in an unpredictable en... 详细信息
来源: 评论
Face Recognition System Using Ant Colony Optimization-Based Selected Features
Face Recognition System Using Ant Colony Optimization-Based ...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Hamidreza Rashidy Kanan Karim Faez Mehdi Hosseinzadeh Image Processing and Pattern Recognition Laboratory Electrical Engineering Department Tehran Polytechnic Amirkabir University of Technology슠 Tehran Iran Department of Computer Engineering University of Isfahan Isfahan Iran
Feature selection (FS) is a most important step which can affect the performance of pattern recognition system. This paper presents a novel feature selection method that is based on ant colony optimization (ACO). ACO ... 详细信息
来源: 评论
Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model
Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Cl...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Lin Wang Yongping Li Chengbo Wang Hongzhou Zhang Shanghai Institute of Applied Physics Chinese Academy and Sciences Shanghai China
This paper introduces Gaborface-based 2DPCA and (2D) 2 PCA classification method based on 2D Gaborface matrices rather than transformed ID feature vectors. Two kinds of strategies to use the bank of Gaborfaces are pro... 详细信息
来源: 评论
Evaluating model drift in machine learning algorithms
Evaluating model drift in machine learning algorithms
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Kevin Nelson George Corbin Mark Anania Matthew Kovacs Jeremy Tobias Misty Blowers BAE Systems Rome NY USA Air Force Research Laboratory Rome NY USA
Machine learning is rapidly emerging as a valuable technology thanks to its ability to learn patterns from large data sets and solve problems that are impossible to model using conventional programming logic. As machi... 详细信息
来源: 评论
Cloud-based collaborative creation and simulation of courses of action: Creation of a prototype web application using new HTML5 features
Cloud-based collaborative creation and simulation of courses...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Eric Torunski CAE Inc. University of Ottawa Ottawa Canada
There are many domains that require predefined plans of action in response to certain events. For example, emergency responders have response plans for emergencies such as airplane crashes or other mass casualty incid... 详细信息
来源: 评论
Simulation analysis on destabilization of complex adaptive organizations
Simulation analysis on destabilization of complex adaptive o...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Il-Chul Moon KAIST Daejeon South Korea
Many adversarial organizations, such as organized crime groups, terrorist networks, and the like, are complex adaptive organizations. Therefore, strategies against them should consider the natures of complexity and ad... 详细信息
来源: 评论
Semi-autonomous management of multiple ad-hoc teams of UAVs
Semi-autonomous management of multiple ad-hoc teams of UAVs
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Richard Loe Christopher Maracchion Andrew Drozd ANDRO Computational Solutions Rome NY USA
A Distributed Battle Manager (DBM) system based on Concurrent MACro Partially Observable Markov Decision Processes (CMAC-POMDP) is proposed to manage multiple competing missions. Implementation details are presented f... 详细信息
来源: 评论