咨询与建议

限定检索结果

文献类型

  • 417 篇 会议
  • 17 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 187 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 62 篇 电气工程
    • 33 篇 控制科学与工程
    • 31 篇 信息与通信工程
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 12 篇 交通运输工程
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 石油与天然气工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
  • 45 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 40 篇 理学
    • 24 篇 数学
    • 9 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 化学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 2 篇 军事学

主题

  • 83 篇 security
  • 64 篇 computational in...
  • 56 篇 computational mo...
  • 28 篇 artificial intel...
  • 28 篇 training
  • 21 篇 intrusion detect...
  • 21 篇 data security
  • 19 篇 computer securit...
  • 18 篇 data models
  • 17 篇 deep learning
  • 17 篇 feature extracti...
  • 17 篇 network security
  • 16 篇 information secu...
  • 16 篇 testing
  • 15 篇 data mining
  • 15 篇 machine learning
  • 14 篇 internet of thin...
  • 14 篇 neural networks
  • 14 篇 protocols
  • 13 篇 computer archite...

机构

  • 6 篇 university of ch...
  • 4 篇 doctoral school ...
  • 4 篇 chinese academy ...
  • 4 篇 keleti károly fa...
  • 3 篇 college of compu...
  • 3 篇 beijing electron...
  • 3 篇 department of co...
  • 3 篇 peng cheng labor...
  • 3 篇 institute of inf...
  • 3 篇 dalhousie univer...
  • 3 篇 doctoral school ...
  • 3 篇 department of co...
  • 3 篇 national univers...
  • 3 篇 obuda univ docto...
  • 2 篇 university of ot...
  • 2 篇 department of co...
  • 2 篇 virginia tech bl...
  • 2 篇 sama partners tu...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...

作者

  • 5 篇 a. nur zincir-he...
  • 5 篇 dipankar dasgupt...
  • 4 篇 dasgupta dipanka...
  • 4 篇 nur zincir-heywo...
  • 4 篇 abielmona rami
  • 3 篇 tick andrea
  • 3 篇 andrea tick
  • 3 篇 malcolm i. heywo...
  • 3 篇 kadena esmeralda
  • 3 篇 alexander h. lev...
  • 3 篇 banati anna
  • 2 篇 kail eszter
  • 2 篇 gilles duc
  • 2 篇 siket mate
  • 2 篇 jean berger
  • 2 篇 denes-fazakas le...
  • 2 篇 jia yan
  • 2 篇 rajnai zoltan
  • 2 篇 levente kovács
  • 2 篇 michael barlow

语言

  • 428 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications"
436 条 记 录,以下是41-50 订阅
排序:
mTRACK-Monitoring time-varying relations in approximately categorised knowledge
mTRACK-Monitoring time-varying relations in approximately ca...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, CISDA 2009
作者: Martin, Trevor Shen, Yun Artificial Intelligence Group University of Bristol BS8 1TR United Kingdom
Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four s... 详细信息
来源: 评论
Examination of the vulnerable levels of user groups based on an IT security model  15
Examination of the vulnerable levels of user groups based on...
收藏 引用
15th ieee International symposium on computational intelligence and Informatics
作者: Ujbanyi, Tibor Katona, Jozsef Kovari, Attila Coll Dunaujvaros Inst Comp Engn Dunaujvaros Hungary
IT security has high priority in a complex, multi user IT system. security systems and safety measurement are needed to protect data and systems. The maximum protect level is determined by defense against external att... 详细信息
来源: 评论
Behavior-Driven Video Analytics System for Critical Infrastructure Protection  7
Behavior-Driven Video Analytics System for Critical Infrastr...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-CISDA)
作者: Curtis, Phillip Harb, Moufid Abielmona, Rami Petriu, Emil Larus Technol Res & Engn Div Ottawa ON Canada Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON Canada
The convergence of a security aware environment with the proliferation of inexpensive high quality video imaging devices has led to the deployment of cameras at a high number of critical infrastructure sites. As many ... 详细信息
来源: 评论
Rapid prototyping of high performance fuzzy computing applications using high level GPU programming for maritime operations support
Rapid prototyping of high performance fuzzy computing applic...
收藏 引用
symposium Series on computational intelligence, ieee SSCI 2011 - 2011 ieee symposium on computational intelligence for security and defense applications, CISDA 2011
作者: Cococcioni, Marco Grasso, Raffaele Rixen, Michel Viale San Bartolomeo 400 19126 La Spezia Italy
The advent of relatively cheap general purpose graphics processing units (GPUs) is having a huge impact on scientific computing. This is opening the door to high performance fuzzy computing (HPFC) to the masses, due t... 详细信息
来源: 评论
Game AI in Delta3D
Game AI in Delta3D
收藏 引用
ieee symposium on computational intelligence and Games
作者: Darken, Christian J. Anderegg, Bradley G. McDowell, Perry L. Naval Postgrad Sch CS Dept MOVES Inst Monterey CA USA Alion Sci & Technol Corp Mclean VA USA
Delta3D is a GNU-licensed open source game engine with an orientation towards supporting "serious games" such as those with defense and homeland security applications. AT is an important issue for serious ga... 详细信息
来源: 评论
Smoothing Gamma Ray Spectra to Improve Outlier Detection  7
Smoothing Gamma Ray Spectra to Improve Outlier Detection
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-CISDA)
作者: Barnabe-Lortie, Vincent Bellinger, Colin Japkowicz, Nathalie Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON K1N 6N5 Canada
Rapid detection of radioisotopes in gamma-ray data can, in some situations, be an important security concern. The task of designing an automated system for this purpose is complex due to, amongst other factors, the no... 详细信息
来源: 评论
On the Use of Design Diversity in Fault Tolerant and Secure Systems: A Qualitative Analysis
On the Use of Design Diversity in Fault Tolerant and Secure ...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (CISDA)
作者: Rodriguez, Manuel Kwiat, Kevin A. Kamhoua, Charles A. Air Force Res Lab Cyber Assurance Branch Informat Directorate Rome NY 13441 USA
The design and development of modern critical systems, including cyber-physical systems, is experiencing a greater reliance on the outsourcing of systems parts and the use of third -party components and tools. These i... 详细信息
来源: 评论
A Spiking Neural Network Based Auto-encoder for Anomaly Detection in Streaming Data
A Spiking Neural Network Based Auto-encoder for Anomaly Dete...
收藏 引用
ieee symposium Series on computational intelligence (ieee SSCI)
作者: Stratton, Peter Wabnitz, Andrew Hamilton, Tara Julia Univ Technol Sch Elect & Data Eng Sydney NSW 2007 Australia Def Sci & Technol Grp Cyber & Elect Warfare Div Edinburgh SA 5111 Australia
Anomaly Detection (AD) is useful for a range of applications including cyber security, health analytics, robotics, defense and big data. Automating the detection of anomalies is necessary to deal with large volumes of... 详细信息
来源: 评论
Passive multitarget tracking using transmitters of opportunity
Passive multitarget tracking using transmitters of opportuni...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, CISDA 2009
作者: Tharmarasa, Ratnasingham Kirubarajan, Thia McDonald, Mike Department of Electrical Engineering McMaster University Hamilton Canada Defense Research and Development Canada Ottawa Canada
Passive Coherent Location (PCL), which uses commercial signals (e.g., FM broadcast, digital TV) as illuminators of opportunity, is an emerging technology in air defense systems. The advantages of PCL are low cost, low... 详细信息
来源: 评论
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques
Applicability issues of Evasion-Based Adversarial Attacks an...
收藏 引用
ieee symposium Series on computational intelligence (ieee SSCI)
作者: Gupta, Kishor Datta Dasgupta, Dipankar Akhtar, Zahid Univ Memphis Comp Sci Dept Memphis TN 38152 USA State Univ New York Polytech Inst Comp Sci Dept New York NY USA
Adversarial attacks are considered security risks for Artificial intelligence-based systems. Researchers have been studying different defense techniques appropriate for adversarial attacks. Evaluation strategies of th... 详细信息
来源: 评论