咨询与建议

限定检索结果

文献类型

  • 417 篇 会议
  • 17 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 187 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 62 篇 电气工程
    • 33 篇 控制科学与工程
    • 31 篇 信息与通信工程
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 12 篇 交通运输工程
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 石油与天然气工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
  • 45 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 40 篇 理学
    • 24 篇 数学
    • 9 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 化学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 2 篇 军事学

主题

  • 83 篇 security
  • 64 篇 computational in...
  • 56 篇 computational mo...
  • 28 篇 artificial intel...
  • 28 篇 training
  • 21 篇 intrusion detect...
  • 21 篇 data security
  • 19 篇 computer securit...
  • 18 篇 data models
  • 17 篇 deep learning
  • 17 篇 feature extracti...
  • 17 篇 network security
  • 16 篇 information secu...
  • 16 篇 testing
  • 15 篇 data mining
  • 15 篇 machine learning
  • 14 篇 internet of thin...
  • 14 篇 neural networks
  • 14 篇 protocols
  • 13 篇 computer archite...

机构

  • 6 篇 university of ch...
  • 4 篇 doctoral school ...
  • 4 篇 chinese academy ...
  • 4 篇 keleti károly fa...
  • 3 篇 college of compu...
  • 3 篇 beijing electron...
  • 3 篇 department of co...
  • 3 篇 peng cheng labor...
  • 3 篇 institute of inf...
  • 3 篇 dalhousie univer...
  • 3 篇 doctoral school ...
  • 3 篇 department of co...
  • 3 篇 national univers...
  • 3 篇 obuda univ docto...
  • 2 篇 university of ot...
  • 2 篇 department of co...
  • 2 篇 virginia tech bl...
  • 2 篇 sama partners tu...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...

作者

  • 5 篇 a. nur zincir-he...
  • 5 篇 dipankar dasgupt...
  • 4 篇 dasgupta dipanka...
  • 4 篇 nur zincir-heywo...
  • 4 篇 abielmona rami
  • 3 篇 tick andrea
  • 3 篇 andrea tick
  • 3 篇 malcolm i. heywo...
  • 3 篇 kadena esmeralda
  • 3 篇 alexander h. lev...
  • 3 篇 banati anna
  • 2 篇 kail eszter
  • 2 篇 gilles duc
  • 2 篇 siket mate
  • 2 篇 jean berger
  • 2 篇 denes-fazakas le...
  • 2 篇 jia yan
  • 2 篇 rajnai zoltan
  • 2 篇 levente kovács
  • 2 篇 michael barlow

语言

  • 428 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications"
436 条 记 录,以下是11-20 订阅
排序:
Guardian of the Ensembles: Introducing Pairwise Adversarially Robust Loss for Resisting Adversarial Attacks in DNN Ensembles
Guardian of the Ensembles: Introducing Pairwise Adversariall...
收藏 引用
2025 ieee/CVF Winter Conference on applications of Computer Vision, WACV 2025
作者: Shukla, Shubhi Dalui, Subhadeep Alam, Manaar Datta, Shubhajit Mondal, Arijit Mukhopadhyay, Debdeep Chakrabarti, Partha Pratim Centre for Computational and Data Sciences Iit Kharagpur India Iit Kharagpur Computer Science and Engineering Department India Center for Cyber Security New York University Abu Dhabi United Arab Emirates Iit Kharagpur Department of Artificial Intelligence India Iit Patna Computer Science and Engineering Department India
Adversarial attacks rely on transferability, where an adversarial example (AE) crafted on a surrogate classifier tends to mislead a target classifier. Recent ensemble methods demonstrate that AEs are less likely to mi... 详细信息
来源: 评论
A Decentralized Greedy Assignment-Learning Spiking Neural Network-based Solution for A Perimeter defense Problem
A Decentralized Greedy Assignment-Learning Spiking Neural Ne...
收藏 引用
computational intelligence in security, Defence and Biometrics (CISDB), ieee symposium on
作者: P Mohammed Thousif Shridhar Velhal Suresh Sundaram Narasimhan Sundararajan Department of Aerospace Engineering Indian Institute of Science Bangalore India Department of Computer Electrical and Space Engineering Luleå University of Technology Luleå Sweden
In this paper, a decentralized Greedy Assignment Learning solution framework using a Spiking neural network (de-GALS) is proposed for solving a Perimeter defense Problem (PDP). A typical PDP scenario considers defende... 详细信息
来源: 评论
2012 ieee symposium on computational intelligence for security and Defence applications (ieee CISDA 2012)
收藏 引用
ieee computational intelligence MAGAZINE 2013年 第1期8卷 12-13页
作者: Abielmona, Rami Larus Technologies CANADA
The 2012 ieee symposium on computational intelligence for security and Defence applications (ieee CISDA 2012) was held from 11 to 13 July 2012 in the Delta Ottawa City Centre Hotel in Ottawa, Canada. This article over...
来源: 评论
Exploring Open Dimensions in Artificial Immune Systems for High-Dimensional Tasks
Exploring Open Dimensions in Artificial Immune Systems for H...
收藏 引用
computational intelligence in Artificial Life and Cooperative Intelligent Systems (ALIFE-CIS), ieee symposium on
作者: Axel Luiggi-Gørrissen Trygve Johansen Woldseth Pauline Catriona Haddow Depart. of Computer Science CRAB Lab NTNU Trondheim Norway
High-dimensional (HD) data is relevant to a wide range of fields e.g. remote sensing, network security, medicine and e-commerce. Improved methods are needed to handle such HD data. Artificial Immune Systems (AIS) have... 详细信息
来源: 评论
RSA Cryptanalysis: An Elitist Genetic Algorithm for Integer Factorization
RSA Cryptanalysis: An Elitist Genetic Algorithm for Integer ...
收藏 引用
computational intelligence in security, Defence and Biometrics Companion (CISDB Companion), ieee symposium on
作者: Aarti Kumari Utpal Garain Sanghamitra Bandyopadhyay Girish Mishra Saibal K. Pal Malay Bhattacharyya CAIML Indian Statistical Institute CVPRU Indian Statistical Institute MIU Indian Statistical Institute Scientific Analysis Group DRDO
The problem of Integer Factorization deals with the disintegration of an integer into prime factors. This has direct applications in cryptanalysis, particularly in breaking the RSA. Lately, scientists have investigate... 详细信息
来源: 评论
Imbalanced malware classification: an approach based on dynamic classifier selection
Imbalanced malware classification: an approach based on dyna...
收藏 引用
computational intelligence in security, Defence and Biometrics Companion (CISDB Companion), ieee symposium on
作者: José Vinicius S. Souza Camila Barbosa Vieira George D. C. Cavalcanti Rafael M. O. Cruz Centro de Informática Universidade Federal de Pernambuco Recife PE Brazil École de Technologie Supérieure Université du Québec Montreal Canada
In recent years, the rise of cyber threats has emphasized the need for robust malware detection systems, especially on mobile devices. Malware, which targets vulnerabilities in devices and user data, represents a subs... 详细信息
来源: 评论
Feature Selection Methods for Intrusion Detection Systems in IoT
Feature Selection Methods for Intrusion Detection Systems in...
收藏 引用
International symposium on Applied Machine intelligence and Informatics (SAMI)
作者: Ons Saadallah Ikrame Nouar Department of Data Science and Engineering ELTE - Eotvös Loránd University Budapest Hungary
IoT systems enhance daily life through smart applications but are vulnerable due to the increasing number of con-nected devices. To address security concerns, Intrusion Detection Systems (IDS) are crucial for detectin... 详细信息
来源: 评论
2012 ieee symposium on computational intelligence for security and defence applications (ieee CISDA 2012)
2012 IEEE symposium on computational intelligence for securi...
收藏 引用
作者: Abielmona, Rami Larus Technologies Canada
The 2012 ieee symposium on computational intelligence (CI) for security and defense applications (ieee CISDA 2012) was held in the Delta Ottawa City Center Hotel in Ottawa, Canada, from July 11-13, 2012. The 2012 even... 详细信息
来源: 评论
Benchmarking Cryptographic Protocols for (IoT) Malware Defence
Benchmarking Cryptographic Protocols for (IoT) Malware Defen...
收藏 引用
International symposium on Applied Machine intelligence and Informatics (SAMI)
作者: Khalil Ben Khaled Dönìz Borsos Jozsef Katona Kandó Kalmán Faculty of Electrical Engineering Institute of Microelectronics and Technology Obuda University Budapest Hungary Kándó Kálmán Faculty of Electrical Engineering Institute of Electronics and Communication Systems Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE... 详细信息
来源: 评论
Enhancing Intrusion Detection Systems with representation methods: A comparative study
Enhancing Intrusion Detection Systems with representation me...
收藏 引用
computational intelligence in security, Defence and Biometrics (CISDB), ieee symposium on
作者: Bruno H. Meyer Aurora T. R. Pozo Michele Nogueira Wagner M. Nunan Zola Department of Informatics Federal University of Paraná Brazil Department of Computer Science Federal University of Minas Gerais Brazil
This paper presents a comparative analysis of three data representation methods for improving Intrusion Detection Systems (IDS). The methods compared are autoencoders, Generative Adversarial Networks (GANs), and contr... 详细信息
来源: 评论