咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 土木工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 1 篇 物理学
    • 1 篇 生物学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 1 篇 data privacy
  • 1 篇 air purification
  • 1 篇 static program a...
  • 1 篇 association rule...
  • 1 篇 security-sensiti...
  • 1 篇 android malware
  • 1 篇 marketing
  • 1 篇 classification

机构

  • 2 篇 economic securit...
  • 2 篇 school of inform...
  • 1 篇 key laboratory o...
  • 1 篇 department of co...
  • 1 篇 computer and inf...
  • 1 篇 department of fo...
  • 1 篇 computer science...
  • 1 篇 jiangsu key labo...
  • 1 篇 department natur...
  • 1 篇 science and engi...
  • 1 篇 national researc...
  • 1 篇 faculty of law t...
  • 1 篇 department of in...
  • 1 篇 network informat...
  • 1 篇 department of co...
  • 1 篇 school of cyber ...
  • 1 篇 college of compu...
  • 1 篇 svims business s...
  • 1 篇 department of co...
  • 1 篇 computer science...

作者

  • 1 篇 kim tai-hoon
  • 1 篇 jianhui luo
  • 1 篇 asnate-salazar e...
  • 1 篇 dong na
  • 1 篇 sobajic d.j.
  • 1 篇 prithi m.
  • 1 篇 li pengwei
  • 1 篇 chengrong wu
  • 1 篇 james craft
  • 1 篇 srinivasa rao k.
  • 1 篇 bityutskiy a.s.
  • 1 篇 fu jianming
  • 1 篇 yu. n. koval
  • 1 篇 stepina i.v.
  • 1 篇 saradzheva o.v.
  • 1 篇 han zhigeng
  • 1 篇 suresh babu c.h.
  • 1 篇 zhang huanguo
  • 1 篇 wang liangmin
  • 1 篇 cheng binlin

语言

  • 9 篇 英文
检索条件"机构=Science and Engineering with a Major in Audit and Computer Security"
9 条 记 录,以下是1-10 订阅
排序:
Using Artificial Intelligence and Deep Learning Methods to Analysis the Marketing Analytics and Its Impact on Human Resource Management Systems  5th
Using Artificial Intelligence and Deep Learning Methods to A...
收藏 引用
5th International Conference on Emerging Technologies in computer engineering: Cognitive Computing and Intelligent IoT, ICETCE 2022
作者: Gambhir, Vinima Asnate-Salazar, Edwin Prithi, M. Alvarado-Tolentino, Joseph Tongkachok, Korakod SVIMS Business School Wadala Maharashtra Mumbai India Computer Science and Engineering Universidad Nacional Santiago Antunez de Mayolo Huaraz Peru Computer Science Periyar University Tamil Nadu Vellore India Science and Engineering with a Major in Audit and Computer Security Universidad Nacional Santiago Antunez de Mayolo Huaraz Peru Faculty of Law Thaksin University Songkhla Thailand
In recent years, all firms have been concerned with marketing analytics. They’re using numerous advanced technologies to analyse marketing analytics. Artificial intelligence (AI) and Deep Learning (DL) technology are... 详细信息
来源: 评论
DeepUserLog: Deep Anomaly Detection on User Log Using Semantic Analysis and Key-Value Data
DeepUserLog: Deep Anomaly Detection on User Log Using Semant...
收藏 引用
International Symposium on Software Reliability engineering (ISSRE)
作者: Wenjing Wang Shida Lu Jianhui Luo Chengrong Wu Network Information Security Audit and Monitoring Engineering Research Center of the Ministry of Education School of Computer Science Fudan University Shanghai China State Grid Shanghai Information & Telecommunication Company Shanghai China
Numerous studies have proven that abnormal behaviors related to business and transactions can be detected from user logs. In actual use, we discover that user logs are often formatted in complex ways, and there are ch...
来源: 评论
Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 944-952页
作者: LI Pengwei FU Jianming XU Chao CHENG Binlin ZHANG Huanguo School of Information Engineering Nanjing Audit University School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University College of Computer Science and Technology Hubei Normal University
security-sensitive operations in Android applications(apps for short) can either be benign or malicious. In this work, we introduce an approach of static program analysis that extracts "second-step behavior featu... 详细信息
来源: 评论
Study of the efficiency of gas purification systems for metallurgical productions  4
Study of the efficiency of gas purification systems for meta...
收藏 引用
4th International Conference on Applied Physics, Information Technologies and engineering 2022, APITECH 2022
作者: Zolkin, A.L. Kolesnikov, A.S. Bityutskiy, A.S. Saradzheva, O.V. Stepina, I.V. Computer and Information Sciences Department Povolzhskiy State University of Telecommunications and Informatics L. Tolstogo Street 23 Samara443010 Russia Department of Science of Production and Innovation M. Auezov South-Kazakhstan University Av. Tauke khan 5 Shymkent160012 Kazakhstan Invent Technology LLP AlmatyA10E5P4 Kazakhstan Economic Security Controlling and Audit Department A.N. Kosygin Russian State University Moscow115035 Russia National Research Moscow State University of Civil Engineering Yaroslavskoe Shosse 26 Moscow129337 Russia
One of the main tools used to study the technological processes of waste gases purification from metallurgical production is physical simulation. The problems of large-scale transitions that arise in the course of suc... 详细信息
来源: 评论
Multipath based privacy protection method for data transmission in SDN  1st
Multipath based privacy protection method for data transmiss...
收藏 引用
1st EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019
作者: Dong, Na Han, Zhigeng Wang, Liangmin School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Zhenjiang China School of Information Engineering Nanjing Audit University Nanjing211815 China
With the development of Software-Defined Networking (SDN), privacy and security issues have become an urgent problem to be solved. Although there are many ways to solve these problems, the existing technology represen... 详细信息
来源: 评论
Calculation of damage from discharges on example of ferroalloy plant
收藏 引用
AIP Conference Proceedings 2024年 第1期2969卷
作者: V. V. Kuleshov A. L. Zolkin Yu. N. Koval O. V. Saradzheva S. V. Shamina Department of Industrial Ecology and Safety FSBEI HE Omsk State Technical University 11 Mira avenue Omsk 644050 Russia Computer and Information Sciences Department Povolzhskiy State University of Telecommunications and Informatics L.Tolstogo Street 23 Samara 443010 Russia Department of forensic engineering and criminal science FSBEI HE Siberian Fire and Rescue Academy EMERCOM of Russia Severnaya Street 1 Zheleznogorsk Krasnoyarsk Krai 662972 Russia Economic security controlling and audit department A.N. Kosygin Russian State University Moscow 115035 Russia Department Natural science disciplines South Ural state agrarian University Gagarin street 13 Troitsk Chelyabinsk region 457100 Russia
Every enterprise faces the issues of waste generation and its disposal during implementation of the production process and manufacturing of finished products. Due to the fact that waste can be different, the process o...
来源: 评论
Distortion technique for hiding sensitive association rules
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2014年 第10期9卷 57-66页
作者: Srinivasa Rao, K. Suresh Babu, C.H. Damodaram, A. Kim, Tai-Hoon Department of Computer Science and Engineering Vignan’s University Vadlamudi Guntur Dist India Department of Computer Science and Engineering Sree Vaanmayi Institute of Science and Technology Bibinagar Nalgonda India Department of Computer Science and Engineering Academic Audit Cell JNTUH Kukatpally Hyderabad India Department of Convergence Security Sungshin Women's University 249-1 Dongseon-dong 3-ga Seoul Korea Republic of
Data mining is the process of extracting hidden patterns of data. Association rule mining is an important data mining task that finds interesting association among a large set of data item. It may disclose pattern and... 详细信息
来源: 评论
Data Storage Media Sanitization Procedures at the U.S. Agency For International Development (USAID)
收藏 引用
EDPACS 2006年 第8期29卷 11-19页
作者: James Craft William Cleveland The Information Systems Security Officer at the United States Agency for International Development (USAID) Bureau for Management Information Resources Management (M/IRM) Information Systems Security Team. He has a BS in business management from George Mason University and has 22 years of experience focusing primarily on systems engineering cybersecurity and enterprise operations. He has played a major role in the implementation of the U.S. Government's Model Information Security Policy. The USAID PRIME Security Program Manager Computer Sciences Corporation in Arlington Virginia. He has MS degrees in information and telecommunications systems management and in military science. Cleveland has over 20 years of experience in the planning and management of a wide variety of functions including business process reengineering and IT security.
This article is derived from a Best security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, Information Resources Management (M/IRM), Information Systems Secu...
来源: 评论
An approach to the direct analysis of transient stability
收藏 引用
European Transactions on Electrical Power 1993年 第3期3卷 241-248页
作者: Djukanovic, M.B. Sobajic, D.J. Pao, Y.‐H. Miodrag B. Djukanovic (1959) received his B.S. M.Sc. and Ph.D. degrees in Electrical Engineering from the University of Belgrade/Yugoslavia in 1982 1985 and 1992 respectively specializing in electric power systems. In 1984 he joined the Electrical Engineering Institute “Nikola Tesla” in Belgrade where he was working on the scientific studies in the field of power systems planning operation and control. In 1985 and 1990 he was appointed as a research scholar at the Royal Institute of Technology Stockholm and Case Western Reserve University Cleveland Ohio. His major in- terests are in the area of power system analysis steady-state and dynamic security and application of neural networks in electric power systems. (Electrical Engineering Institute “Nicola Tesla” ul. Koste Glavinica 8A YU-11000 Belgrad T +3811/2351-619 Fax + 3811/2351-823) Dejan J. Sobajic (1949) received the B.S.E.E. and the M.S.E.E. degrees from the University of Belgrade/Yugoslavia in 1972 and 1976 respectively and the Ph.D. degree from Case Western Reserve University Cleveland Ohio in 1988. At present he is with the Department of Electrical Engineering and Applied Physics Case Western Reserve University Cleveland. He is also the Engineering Manager of A1 WARE Inc. Cleveland. His current research interests include power system operation and control neuralnet systems and adaptive control. He is a member of the IEEE Task Force on Neural-Network Applications in Power Systems and of the IEEE Intelligent Controls Committee. He is the Chairman of the International Neural-Networks Society Special Interest Group on Power Engineering. (Case Western Reserve University Department of Electrial Engineering and Computer Sciences Glennan Building Ohio 44 106 USA T + 1216/421-2380 Fax +1216/368-8776) Yoh-Han Pao (1922) has been a Professor of Electrical Engineering and Computer Science at Case Westem Reserve University (CWRU) Cleveland Ohio since 1967. He has served as chairman of the University's Electrical Engineering Department
The Transient Energy Function (TEF) method has been intensely investigated over the last decade as a reliable and accurate tool for transient stability assessment of multimachine power systems. In this paper we propos...
来源: 评论