咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 19 篇 电气工程
    • 16 篇 软件工程
    • 8 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 土木工程
    • 1 篇 建筑学
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 19 篇 computational mo...
  • 16 篇 intrusion detect...
  • 14 篇 data security
  • 11 篇 testing
  • 10 篇 military computi...
  • 9 篇 computer securit...
  • 9 篇 data mining
  • 8 篇 monitoring
  • 8 篇 artificial intel...
  • 8 篇 training
  • 7 篇 particle swarm o...
  • 7 篇 feature extracti...
  • 7 篇 information secu...
  • 6 篇 computer archite...
  • 6 篇 optimization
  • 6 篇 decision making
  • 6 篇 algorithm design...
  • 6 篇 surveillance

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 department of co...
  • 2 篇 larus technologi...
  • 2 篇 air force resear...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 virginia tech bl...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...

作者

  • 4 篇 a. nur zincir-he...
  • 4 篇 abielmona rami
  • 3 篇 alexander h. lev...
  • 2 篇 jean berger
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 chris thornton
  • 2 篇 trevor martin
  • 2 篇 anna t. lawnicza...
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 malcolm i. heywo...
  • 2 篇 philip hingston

语言

  • 148 篇 英文
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA"
149 条 记 录,以下是81-90 订阅
排序:
Dynamical networks as a tool for system analysis and exploration
Dynamical networks as a tool for system analysis and explora...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Irene Pestov Simona Verga Centre for Operational Research and Analysis Defence Research and Development Canada Ottawa Canada
This paper attempts to bring together methods and tools across three selected areas of computational intelligence pertaining to complex systems: dynamical networks, statistical machine learning, and multi-agent techno... 详细信息
来源: 评论
Fast localization in indoor environments
Fast localization in indoor environments
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Rimon Elias Amal Elnahas German University in Cairo New Cairo Egypt
In this paper, we propose an algorithm for fast indoor localization. The algorithm does not require any sensors to be installed; instead, localization is determined using image matching. Our system studies (or learns)... 详细信息
来源: 评论
Iris biometric authentication based on local global graphs: An FPGA implementation
Iris biometric authentication based on local global graphs: ...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Raghudeep Kannavara Nikolaos Bourbakis Assistive Technologies Research Center Wright State University Dayton OH USA
In this work, we present a local-global (LG) graph methodology for iris based biometric authentication. Local-global (LG) graph method adds local part information into a global graph. Local graphs of the pre-processed... 详细信息
来源: 评论
Automatically Evading IDS Using GP Authored Attacks
Automatically Evading IDS Using GP Authored Attacks
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: H. Gunes Kayacik A. Nur Zincir-Heywood Malcolm I. Heywood Dalhousie University Halifax NS Canada
A mimicry attack is a type of attack where the basic steps of a minimalist 'core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks ... 详细信息
来源: 评论
Multiple UAV teams for multiple tasks
Multiple UAV teams for multiple tasks
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: P.B. Sujit Joao Sousa Fernando Pereira Department of Electrical and Computer Engineering University of Porta Portugal
In a search and prosecute mission, multiple heterogeneous unmanned aerial vehicles UAVs that carry different resources need to perform the classify, prosecute and battle damage assessment (BDA) tasks on targets sequen... 详细信息
来源: 评论
Detection & study of DDoS attacks via entropy in data network models
Detection & study of DDoS attacks via entropy in data networ...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Anna T. Lawniczak Bruno N. Di Stefano Hao Wu Mathematics & Statistics University of Guelph Guelph ONT Canada Nuptek Systems Limited Torreon ONT USA University of Guelph Canada
We detect & study packet traffic anomalies similar to DDoS attacks using information entropy. We perform network-wide monitoring of information entropy of packet traffic at a small number of selected routers. Our ... 详细信息
来源: 评论
A detailed analysis of the KDD CUP 99 data set
A detailed analysis of the KDD CUP 99 data set
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Mahbod Tavallaee Ebrahim Bagheri Wei Lu Ali A. Ghorbani University of New Brunswick Fredericton NB Canada Institute for Information Technology National Research Council Canada Canada
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data s... 详细信息
来源: 评论
Application of voiced-speech variability descriptors to emotion recognition
Application of voiced-speech variability descriptors to emot...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Krzysztof Ślot Jarosław Cichosz Łukasz Bronakowski Institute of Electronics Technical University of Lodz Lodz Poland
The following paper examines a possibility of applying phone-pronunciation variability descriptors in emotion classification. The proposed group of descriptors comprises a set of statistical parameters of Poincare map... 详细信息
来源: 评论
mTRACK — Monitoring time-varying relations in approximately categorised knowledge
mTRACK — Monitoring time-varying relations in approximately...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Trevor Martin Yun Shen Artificial Intelligence Group University of Bristol UK
Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four s... 详细信息
来源: 评论
Secure two and multi-party association rule mining
Secure two and multi-party association rule mining
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Saeed Samet Ali Miri School of Information Technology and Engineering SITE University of Ottawa Ottawa Canada
Association rule mining provides useful knowledge from raw data in different applications such as health, insurance, marketing and business systems. However, many real world applications are distributed among two or m... 详细信息
来源: 评论