找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen

[復制鏈接]
查看: 31615|回復: 56
樓主
發(fā)表于 2025-3-21 19:00:48 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Computational Intelligence in Security for Information Systems
副標題CISIS‘09, 2nd Intern
編輯álvaro Herrero,Paolo Gastaldo,Emilio Corchado
視頻videohttp://file.papertrans.cn/233/232536/232536.mp4
概述Presents latest research in Computational Intelligence in Security for Information Systems.Proceedings of the CISIS‘09 Workshop: 23rd-26th September, 2009 held in Burgos
叢書名稱Advances in Intelligent and Soft Computing
圖書封面Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen
描述The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligent and Soft Computing contains accepted - rd th pers presented at CISIS’09, which was held in Burgos, Spain, on September 23 -26 , 2009. After a through peer-review process, the International Program Committee selected 25 papers which are published in this workshop proceedings. This allowed the Scientific Committee to verify the vital and c
出版日期Conference proceedings 2009
關(guān)鍵詞Signal; bioinformatics; communication; computational intelligence; data mining; data security; expert syst
版次1
doihttps://doi.org/10.1007/978-3-642-04091-7
isbn_softcover978-3-642-04090-0
isbn_ebook978-3-642-04091-7Series ISSN 1867-5662 Series E-ISSN 1867-5670
issn_series 1867-5662
copyrightSpringer-Verlag Berlin Heidelberg 2009
The information of publication is updating

書目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)




書目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)學科排名




書目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡公開度




書目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡公開度學科排名




書目名稱Computational Intelligence in Security for Information Systems被引頻次




書目名稱Computational Intelligence in Security for Information Systems被引頻次學科排名




書目名稱Computational Intelligence in Security for Information Systems年度引用




書目名稱Computational Intelligence in Security for Information Systems年度引用學科排名




書目名稱Computational Intelligence in Security for Information Systems讀者反饋




書目名稱Computational Intelligence in Security for Information Systems讀者反饋學科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:40:50 | 只看該作者
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrast to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.
板凳
發(fā)表于 2025-3-22 03:59:12 | 只看該作者
地板
發(fā)表于 2025-3-22 05:51:46 | 只看該作者
Towards Ontology-Based Intelligent Model for Intrusion Detection and Preventioning Ontology Web Language with Description Logic (OWL-DL) with event communication and correlation integrated on Multi-Agent Systems, incorporating supervised and unsupervised models and generating intelligent reasoning.
5#
發(fā)表于 2025-3-22 09:19:15 | 只看該作者
1867-5662 eptember, 2009 held in BurgosThe Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Net
6#
發(fā)表于 2025-3-22 15:59:29 | 只看該作者
Dieter Specht,Christian M. F. Gru?entation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.
7#
發(fā)表于 2025-3-22 19:35:32 | 只看該作者
https://doi.org/10.1007/978-3-658-44736-6rity rules is discussed. The system is defined by axioms and rules, and the concepts of the security models are then considered in order to evaluate the rules. It is showed how to lead to certain formulas in order to determine the validity of the set of fundamental expressions that constitute the security models. It uses a system S5.
8#
發(fā)表于 2025-3-23 01:00:58 | 只看該作者
Grundaspekte des Strategischen Controllings,ls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.
9#
發(fā)表于 2025-3-23 02:57:01 | 只看該作者
Strategische Entwicklung von Sportvereinenching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.
10#
發(fā)表于 2025-3-23 06:53:43 | 只看該作者
,Gestaltungsorientiertes Resümee,ptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-16 22:58
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
青河县| 南昌市| 长治市| 南江县| 隆化县| 客服| 东至县| 越西县| 大方县| 鹿泉市| 望都县| 杨浦区| 东山县| 双城市| 安徽省| 灵石县| 曲周县| 册亨县| 项城市| 平邑县| 湖州市| 曲松县| 上思县| 塔河县| 澳门| 西乌珠穆沁旗| 黑水县| 辉南县| 河源市| 耿马| 松原市| 上蔡县| 枣阳市| 沽源县| 扬州市| 望都县| 嘉义县| 青海省| 赤城县| 扬州市| 克拉玛依市|