咨询与建议

限定检索结果

文献类型

  • 417 篇 会议
  • 17 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 187 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 62 篇 电气工程
    • 33 篇 控制科学与工程
    • 31 篇 信息与通信工程
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 12 篇 交通运输工程
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 石油与天然气工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
  • 45 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 40 篇 理学
    • 24 篇 数学
    • 9 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 化学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 2 篇 军事学

主题

  • 83 篇 security
  • 64 篇 computational in...
  • 56 篇 computational mo...
  • 28 篇 artificial intel...
  • 28 篇 training
  • 21 篇 intrusion detect...
  • 21 篇 data security
  • 19 篇 computer securit...
  • 18 篇 data models
  • 17 篇 deep learning
  • 17 篇 feature extracti...
  • 17 篇 network security
  • 16 篇 information secu...
  • 16 篇 testing
  • 15 篇 data mining
  • 15 篇 machine learning
  • 14 篇 internet of thin...
  • 14 篇 neural networks
  • 14 篇 protocols
  • 13 篇 computer archite...

机构

  • 6 篇 university of ch...
  • 4 篇 doctoral school ...
  • 4 篇 chinese academy ...
  • 4 篇 keleti károly fa...
  • 3 篇 college of compu...
  • 3 篇 beijing electron...
  • 3 篇 department of co...
  • 3 篇 peng cheng labor...
  • 3 篇 institute of inf...
  • 3 篇 dalhousie univer...
  • 3 篇 doctoral school ...
  • 3 篇 department of co...
  • 3 篇 national univers...
  • 3 篇 obuda univ docto...
  • 2 篇 university of ot...
  • 2 篇 department of co...
  • 2 篇 virginia tech bl...
  • 2 篇 sama partners tu...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...

作者

  • 5 篇 a. nur zincir-he...
  • 5 篇 dipankar dasgupt...
  • 4 篇 dasgupta dipanka...
  • 4 篇 nur zincir-heywo...
  • 4 篇 abielmona rami
  • 3 篇 tick andrea
  • 3 篇 andrea tick
  • 3 篇 malcolm i. heywo...
  • 3 篇 kadena esmeralda
  • 3 篇 alexander h. lev...
  • 3 篇 banati anna
  • 2 篇 kail eszter
  • 2 篇 gilles duc
  • 2 篇 siket mate
  • 2 篇 jean berger
  • 2 篇 denes-fazakas le...
  • 2 篇 jia yan
  • 2 篇 rajnai zoltan
  • 2 篇 levente kovács
  • 2 篇 michael barlow

语言

  • 428 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications"
436 条 记 录,以下是71-80 订阅
排序:
Exploring Transfer Function Nonlinearity in Echo State Networks
Exploring Transfer Function Nonlinearity in Echo State Netwo...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (CISDA)
作者: Goudarzi, Alireza Shabani, Alireza Stefanovic, Darko Univ New Mexico Dept Comp Sci Albuquerque NM 87131 USA Google Inc Venice CA 90291 USA Univ New Mexico Ctr Biomed Engn Albuquerque NM 87131 USA
Supralinear and sublinear pre-synaptic and dendritic integration is considered to be responsible for nonlinear computation power of biological neurons, emphasizing the role of nonlinear integration as opposed to nonli... 详细信息
来源: 评论
A Fuzzy-based Approach for Approximating Depth Information in RGB-D Images
A Fuzzy-based Approach for Approximating Depth Information i...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-CISDA)
作者: Mau Uyen Nguyen Thanh Tinh Dao Long Thanh Ngo Le Quy Don Tech Univ Fac Informat Technol Dept Informat Syst Hanoi Vietnam
Robot navigation has several security and defence applications. The major technical challenges include measuring the distance between a robot and its surrounding obstacles and modelling the sensing environment. Existi... 详细信息
来源: 评论
5G Vulnarabilities from security Operation Center's Perspective  21
5G Vulnarabilities from Security Operation Center's Perspect...
收藏 引用
21st ieee International symposium on computational intelligence and Informatics
作者: Mahmoud, Doaa Toth, Andras Balint Kail, Eszter Banati, Anna Obuda Univ John von Neumann Fac Informat Budapest Hungary
5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, ... 详细信息
来源: 评论
B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule  7
B-tree based two-dimensional early packet rejection techniqu...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications, CISDA 2014
作者: Hung, Nguyen Manh Nhat, Vu Duy Post-graduate Department Military Technical Academy Ha Noi Viet Nam Information Technology Security MoD of Vietnam Hanoi Viet Nam
Regarding to the current computer networks, firewall is vital equipment for ensuring the security of entire systems. With the role of controlling all connected to a network, firewall is the only connection between net... 详细信息
来源: 评论
Analyzing and Developing security Techniques for Worms in Cognitive Networks
Analyzing and Developing Security Techniques for Worms in Co...
收藏 引用
7th ieee International Conference on computational intelligence and Computing Research (ICCIC)
作者: Saini, Natasha Pandey, Nitin Singh, Ajeet Pal Amity Inst Informat Technol Noida India Raj Kumar Goel Inst Engn & Technol Ghaziabad India
Networking provides the main infrastructure for different recent applications. These applications are targets for different types of attack. In this paper a structured literature for different types of attacks has bee... 详细信息
来源: 评论
Model of Human Clothes based on Saliency Maps
Model of Human Clothes based on Saliency Maps
收藏 引用
14th ieee International symposium on computational intelligence and Informatics (CINTI)
作者: Hommel, Sebastian Malysiak, Darius Handmann, Uwe Univ Appl Sci Ruhr West Inst Comp Sci Bottrop Germany
In this paper, we describe a method to model human clothes for a later recognition by the use of RGB- and SWIR-cameras. A basic model is estimated during people detection and tracking. This model will be refined if th... 详细信息
来源: 评论
RDS3: Ransomware defense Strategy by Using Stealthily Spare Space
RDS3: Ransomware Defense Strategy by Using Stealthily Spare ...
收藏 引用
ieee symposium Series on computational intelligence (ieee SSCI)
作者: Subedi, Kul Prasad Budhathoki, Daya Ram Chen, Bo Dasgupta, Dipankar Univ Memphis Dept Comp Sci Memphis TN 38152 USA Michigan Technol Univ Dept Comp Sci Houghton MI 49931 USA
Ransomware attacks are becoming prevalent nowadays with the flourishing of crypto-currencies. As the most harmful variant of ransomware crypto-ransomware encrypts the victim's valuable data, and asks for ransom mo... 详细信息
来源: 评论
DMEA-II and its application on spam email detection problems
DMEA-II and its application on spam email detection problems
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-CISDA)
作者: Long Nguyen Anh Quang Tran Lam Thu Bui Le Quy Don Tech Univ Fac Informat Technol Hanoi Vietnam Univ Hanoi Fac Informat Technol Hanoi Vietnam
This paper deals with multi-objectitivty in the problem of Vietnamese spam detection. We first analyze the problem taking into account the specific Vietnamese characterises as well as multi-objectivity. With the use o... 详细信息
来源: 评论
Survey regarding the Way Students Perceive security Permissions of Mobile applications  13
Survey regarding the Way Students Perceive Security Permissi...
收藏 引用
ieee 13th International symposium on Applied computational intelligence and Informatics (SACI)
作者: Lorint, Roxana Marcu, Marius Politehn Univ Timisoara Timisoara Romania
In the last decades the technology had made an enormous progress, but at the same time the risks have grown to. Every time a mobile application is about to be installed, the user is being informed about the permission... 详细信息
来源: 评论
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
Game theory-based defense mechanisms against DDoS attacks on...
收藏 引用
ieee symposium on computational intelligence in Cyber security
作者: Bedi, Harkeerat Singh Roy, Sankardas Shiva, Sajjan Department of Computer Science University of Memphis TN United States
While there are significant advances in information technology and infrastructure which offer new opportunities, cyberspace is still far from completely secured. In many cases, the employed security solutions are ad h... 详细信息
来源: 评论