咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 控制科学与工程
    • 2 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 1 篇 chi-square
  • 1 篇 precision
  • 1 篇 recall
  • 1 篇 best search firs...
  • 1 篇 heart stroke
  • 1 篇 accuracy
  • 1 篇 artificial neura...
  • 1 篇 f-measure
  • 1 篇 computer viruses
  • 1 篇 fuzzy k-nearest ...

机构

  • 1 篇 cybersecurity ce...
  • 1 篇 cybersecurity en...
  • 1 篇 school of comput...
  • 1 篇 research center ...
  • 1 篇 instituto de tel...
  • 1 篇 school of softwa...
  • 1 篇 department infor...
  • 1 篇 cardiff school o...
  • 1 篇 national cyber a...

作者

  • 1 篇 ivan miguel pire...
  • 1 篇 ira rosianal hik...
  • 1 篇 sheikh tahir bak...
  • 1 篇 shamsher ullah
  • 1 篇 ramadan fahmi
  • 1 篇 farhan ullah
  • 1 篇 hikmah ira rosia...
  • 1 篇 jiangbin zheng
  • 1 篇 ira puspitasari
  • 1 篇 fahmi ramadan
  • 1 篇 abdul ahad

语言

  • 2 篇 英文
  • 1 篇 其他
检索条件"机构=Cybersecurity Engineering Study Program"
3 条 记 录,以下是1-10 订阅
排序:
Redline Stealer Malware Analysis with Surface, Runtime, and Static Code Methods  1
Redline Stealer Malware Analysis with Surface, Runtime, and ...
收藏 引用
1st IEEE International Conference on Cryptography, Informatics, and cybersecurity, ICoCICs 2023
作者: Ramadan, Fahmi Hikmah, Ira Rosianal National Cyber and Crypto Polytechnic Cybersecurity Engineering Study Program Bogor Indonesia
Data is becoming a new resource with high value, so many parties are interested in owning it. There are many ways to take it, one of which is planting and spreading malware known as stealer malware. Over time, malware... 详细信息
来源: 评论
Redline Stealer Malware Analysis with Surface, Runtime, and Static Code Methods
Redline Stealer Malware Analysis with Surface, Runtime, and ...
收藏 引用
Cryptography, Informatics, and cybersecurity (ICoCICs), IEEE International Conference on
作者: Fahmi Ramadan Ira Rosianal Hikmah Cybersecurity Engineering Study Program National Cyber and Crypto Polytechnic Bogor Indonesia
Data is becoming a new resource with high value, so many parties are interested in owning it. There are many ways to take it, one of which is planting and spreading malware known as stealer malware. Over time, malware...
来源: 评论
Machine Learning Stroke Prediction in Smart Healthcare:Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5115-5134页
作者: Abdul Ahad Ira Puspitasari Jiangbin Zheng Shamsher Ullah Farhan Ullah Sheikh Tahir Bakhsh Ivan Miguel Pires Department Information System Study Program Faculty of Science and TechnologyUniversitas AirlanggaSurabaya60286Indonesia School of Software Northwestern Polytechnical UniversityXi’an710072China Research Center for Quantum Engineering Design Faculty of Science and TechnologyUniversitas AirlanggaSurabaya60286Indonesia School of Computer Science and Software Engineering Shenzhen UniversityShenzhen518061China Cybersecurity Center Prince Mohammad Bin Fahd University617Al JawharahKhobarDhahran34754Saudi Arabia Cardiff School of Technologies Cardiff Metropolitan UniversityWestern AvenueCardiffCF52YBUK Instituto de Telecomunicacoes Escola Superior de Tecnologia e Gestao de AguedaUniversidade de Aveiroágueda3750-127Portugal
This research explores the use of Fuzzy K-Nearest Neighbor(F-KNN)and Artificial Neural Networks(ANN)for predicting heart stroke incidents,focusing on the impact of feature selection methods,specifically Chi-Square and... 详细信息
来源: 评论