咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 50 篇 计算机科学与技术...
    • 20 篇 电气工程
    • 16 篇 软件工程
    • 8 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 土木工程
    • 1 篇 建筑学
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 20 篇 computational mo...
  • 16 篇 intrusion detect...
  • 14 篇 data security
  • 11 篇 military computi...
  • 11 篇 testing
  • 9 篇 computer securit...
  • 9 篇 data mining
  • 8 篇 monitoring
  • 8 篇 artificial intel...
  • 8 篇 training
  • 7 篇 particle swarm o...
  • 7 篇 feature extracti...
  • 7 篇 information secu...
  • 6 篇 computer archite...
  • 6 篇 optimization
  • 6 篇 decision making
  • 6 篇 algorithm design...
  • 6 篇 surveillance

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 department of co...
  • 2 篇 larus technologi...
  • 2 篇 air force resear...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 virginia tech bl...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...

作者

  • 4 篇 a. nur zincir-he...
  • 4 篇 abielmona rami
  • 3 篇 alexander h. lev...
  • 2 篇 jean berger
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 chris thornton
  • 2 篇 trevor martin
  • 2 篇 anna t. lawnicza...
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 malcolm i. heywo...
  • 2 篇 philip hingston

语言

  • 149 篇 英文
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA"
150 条 记 录,以下是111-120 订阅
排序:
Towards an Information Asset-Based Defensive Cyber Damage Assessment Process
Towards an Information Asset-Based Defensive Cyber Damage As...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Michael R. Grimaila Larry W. Fortson Center for Information Security Education and Research Air Force Institute of Technology OH USA
The use of computers and communication technologies to enhance command and control (C2) processes has yielded enormous benefits in military operations. Commanders are able to make higher quality decisions by accessing... 详细信息
来源: 评论
FASER (Formal and Automatic security Enforcement by Rewriting): An algebraic approach
FASER (Formal and Automatic Security Enforcement by Rewritin...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Guangye Sui Mohamed Mejri Hatem Ben Sta Laval University QUE Canada University of Tunis Tunis Tunisia
Recent research confirmed that program rewriting techniques are powerful mechanisms for security enforcement, since they gather advantages of both static and dynamic approaches. In a previous work, we introduced the b... 详细信息
来源: 评论
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security
Towards a formal framework for evaluating the effectiveness ...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Raphaël Khoury Abdelwahab Hamou-Lhadj Mario Couture Defence Research and Development Canada Ottawa ON CA Concordia University Department of Electrical & Computer Engineering Montreal Quebec Canada Defence Research and Development Canada Valcartier Quebec Canada
N-version programming has been shown to be an effective way to increase the reliability of systems. In this study, we examine the possibility of extending this approach to address security, rather than reliability con... 详细信息
来源: 评论
A Temporal Risk Assessment Framework for Planning A Future Force Structure
A Temporal Risk Assessment Framework for Planning A Future F...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Michael Barlow Ang Yang Hussein A. Abbass Defence and Security Applications Reearch Centre UNSW at Auastalian Defence Force Academy Canberra Australia
Planning future force structures is usually associated with a high, but difficult to quantify, risk factor. Among many other reasons for the importance of this planning process, the defence industry requires the milit... 详细信息
来源: 评论
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications
Toward Open-Set Text-Independent Speaker Identification in T...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Matt B. Wolf WonKyung Park Jae C. Oh Misty K. Blowers Syracuse University NY USA
We present the design and implementation of an open-set text-independent speaker identification system using genetic learning classifier systems (LCS). We examine the use of this system in a real-number problem domain... 详细信息
来源: 评论
Neural-based iterative approach for iris detection in iris recognition systems
Neural-based iterative approach for iris detection in iris r...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Ruggero Donida Labati Vincenzo Piuri Fabio Scotti Quantum Optics Quantum Nanophysics Quantum Information University of Vienna Vienna Austria Institute for Quantum Optics and Quantum Information - Austrian Academy of Sciences Vienna Austria
The detection of the iris boundaries is considered in the literature as one of the most critical steps in the identification task of the iris recognition systems. In this paper we present an iterative approach to the ... 详细信息
来源: 评论
Course of Action Analysis in a Cultural Landscape Using Influence Nets
Course of Action Analysis in a Cultural Landscape Using Infl...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Lee W. Wagenhals Alexander H. Levis System Architectures Laboratory ECE Department MS 1G5 George Mason University Fairfax VA USA
Since 1992 the nature of military operations has changed. The type of objectives that the military has to address has expanded well beyond those of traditional major combat operations. As military operations become ot... 详细信息
来源: 评论
A Cognitive Approach to Intrusion Detection
A Cognitive Approach to Intrusion Detection
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: D. Paul Benjamin Computer Science Department Pace University NY USA
The VMSoar project at Pace University is building a cognitive agent for cybersecurity. The project's objective is to create an intelligent agent that can model and understand the activities of users who are on the... 详细信息
来源: 评论
An online shadowed clustering algorithm applied to risk visualization in Territorial security
An online shadowed clustering algorithm applied to risk visu...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Rafael Falcon Amiya Nayak Rami Abielmona Electrical Engineering and Computer Science University of Ottawa Ottawa ON Canada Research & Engineering Larus Technologies Corporation Ottawa ON Canada
The identification and processing of the risk sources that prevail in a sensor-monitored area is crucial to guarantee the uninterrupted and efficient operation of the surveillance system. In particular, a time-varying... 详细信息
来源: 评论
An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’
An optimisation model for airlift load planning: Galahad and...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Bohdan L. Kaluzny R.H.A. David Shaw Ahmed Ghanmi Beomjoon Kim Canadian Department of National Defence Centre for Operational Research & Analysis Defence Research and Development Canada Ottawa ONT Canada Department of Mechanical and Mechatronics Engineering University of Waterloo Waterloo ONT Canada
This paper presents an aircraft load allocation optimisation model, which uses a hybrid of simulated annealing and genetic algorithm methods to solve a multi-objective optimisation problem associated with allocating a... 详细信息
来源: 评论