找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen

[復(fù)制鏈接]
查看: 31614|回復(fù): 56
樓主
發(fā)表于 2025-3-21 19:00:48 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Computational Intelligence in Security for Information Systems
副標(biāo)題CISIS‘09, 2nd Intern
編輯álvaro Herrero,Paolo Gastaldo,Emilio Corchado
視頻videohttp://file.papertrans.cn/233/232536/232536.mp4
概述Presents latest research in Computational Intelligence in Security for Information Systems.Proceedings of the CISIS‘09 Workshop: 23rd-26th September, 2009 held in Burgos
叢書(shū)名稱Advances in Intelligent and Soft Computing
圖書(shū)封面Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen
描述The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligent and Soft Computing contains accepted - rd th pers presented at CISIS’09, which was held in Burgos, Spain, on September 23 -26 , 2009. After a through peer-review process, the International Program Committee selected 25 papers which are published in this workshop proceedings. This allowed the Scientific Committee to verify the vital and c
出版日期Conference proceedings 2009
關(guān)鍵詞Signal; bioinformatics; communication; computational intelligence; data mining; data security; expert syst
版次1
doihttps://doi.org/10.1007/978-3-642-04091-7
isbn_softcover978-3-642-04090-0
isbn_ebook978-3-642-04091-7Series ISSN 1867-5662 Series E-ISSN 1867-5670
issn_series 1867-5662
copyrightSpringer-Verlag Berlin Heidelberg 2009
The information of publication is updating

書(shū)目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)




書(shū)目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)學(xué)科排名




書(shū)目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Computational Intelligence in Security for Information Systems被引頻次




書(shū)目名稱Computational Intelligence in Security for Information Systems被引頻次學(xué)科排名




書(shū)目名稱Computational Intelligence in Security for Information Systems年度引用




書(shū)目名稱Computational Intelligence in Security for Information Systems年度引用學(xué)科排名




書(shū)目名稱Computational Intelligence in Security for Information Systems讀者反饋




書(shū)目名稱Computational Intelligence in Security for Information Systems讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:40:50 | 只看該作者
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrast to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.
板凳
發(fā)表于 2025-3-22 03:59:12 | 只看該作者
地板
發(fā)表于 2025-3-22 05:51:46 | 只看該作者
Towards Ontology-Based Intelligent Model for Intrusion Detection and Preventioning Ontology Web Language with Description Logic (OWL-DL) with event communication and correlation integrated on Multi-Agent Systems, incorporating supervised and unsupervised models and generating intelligent reasoning.
5#
發(fā)表于 2025-3-22 09:19:15 | 只看該作者
1867-5662 eptember, 2009 held in BurgosThe Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Net
6#
發(fā)表于 2025-3-22 15:59:29 | 只看該作者
Dieter Specht,Christian M. F. Gru?entation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.
7#
發(fā)表于 2025-3-22 19:35:32 | 只看該作者
https://doi.org/10.1007/978-3-658-44736-6rity rules is discussed. The system is defined by axioms and rules, and the concepts of the security models are then considered in order to evaluate the rules. It is showed how to lead to certain formulas in order to determine the validity of the set of fundamental expressions that constitute the security models. It uses a system S5.
8#
發(fā)表于 2025-3-23 01:00:58 | 只看該作者
Grundaspekte des Strategischen Controllings,ls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.
9#
發(fā)表于 2025-3-23 02:57:01 | 只看該作者
Strategische Entwicklung von Sportvereinenching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.
10#
發(fā)表于 2025-3-23 06:53:43 | 只看該作者
,Gestaltungsorientiertes Resümee,ptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 20:30
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
宁远县| 大足县| 衡山县| 宜兰市| 四子王旗| 涟水县| 万安县| 潼南县| 桐梓县| 扶绥县| 大洼县| 乐至县| 旌德县| 彩票| 鱼台县| 五台县| 泸定县| 建昌县| 黄石市| 阳城县| 禹城市| 子长县| 紫云| 沈丘县| 沐川县| 吐鲁番市| 北海市| 安泽县| 中宁县| 郧西县| 大冶市| 监利县| 防城港市| 南平市| 兰西县| 图们市| 泰来县| 辰溪县| 乐昌市| 永修县| 永和县|