Studies in computational intelligence最新文献

筛选
英文 中文
A Machine Learning Based Secure Change Management 基于机器学习的安全变更管理
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_23
Mounia Zaydi, B. Nassereddine
{"title":"A Machine Learning Based Secure Change Management","authors":"Mounia Zaydi, B. Nassereddine","doi":"10.1007/978-3-030-57024-8_23","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_23","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian Networks for Online Cybersecurity Threat Detection 在线网络安全威胁检测的贝叶斯网络
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_6
Mauro José Pappaterra, Francesco Flammini
{"title":"Bayesian Networks for Online Cybersecurity Threat Detection","authors":"Mauro José Pappaterra, Francesco Flammini","doi":"10.1007/978-3-030-57024-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_6","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network IntAnti-Phish:基于反向传播神经网络的智能反网络钓鱼框架
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_9
Sheikh Shah Mohammad Motiur Rahman, Lakshman Gope, Takia Islam, M. Alazab
{"title":"IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network","authors":"Sheikh Shah Mohammad Motiur Rahman, Lakshman Gope, Takia Islam, M. Alazab","doi":"10.1007/978-3-030-57024-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_9","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Deep Learning Model to Secure Internet of Things in Healthcare 一种新的深度学习模型来保护医疗保健中的物联网
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_15
Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, M. Alazab, A. Jolfaei, Asad Ullah, Uzair Saeed
{"title":"A Novel Deep Learning Model to Secure Internet of Things in Healthcare","authors":"Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, M. Alazab, A. Jolfaei, Asad Ullah, Uzair Saeed","doi":"10.1007/978-3-030-57024-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_15","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intermediary Technical Interoperability Component TIC Connecting Heterogeneous Federation Systems 连接异构联邦系统的中间技术互操作性组件TIC
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_24
Hasnae L'Amrani, Y. Idrissi, R. Ajhoun
{"title":"Intermediary Technical Interoperability Component TIC Connecting Heterogeneous Federation Systems","authors":"Hasnae L'Amrani, Y. Idrissi, R. Ajhoun","doi":"10.1007/978-3-030-57024-8_24","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_24","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Application Security Using Static and Dynamic Analysis 使用静态和动态分析的移动应用程序安全性
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_20
H. Shahriar, Chi Zhang, Arabin Islam Talukder, Saiful Islam
{"title":"Mobile Application Security Using Static and Dynamic Analysis","authors":"H. Shahriar, Chi Zhang, Arabin Islam Talukder, Saiful Islam","doi":"10.1007/978-3-030-57024-8_20","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_20","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ameliorated Face and Iris Recognition Using Deep Convolutional Networks 利用深度卷积网络改进人脸和虹膜识别
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_12
B. Muthazhagan, Suriya Sundaramoorthy
{"title":"Ameliorated Face and Iris Recognition Using Deep Convolutional Networks","authors":"B. Muthazhagan, Suriya Sundaramoorthy","doi":"10.1007/978-3-030-57024-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_12","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115136358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids ENERMONGRID:智能电网的智能能源监测、可视化和欺诈检测
Studies in computational intelligence Pub Date : 2020-12-01 DOI: 10.1007/978-3-030-71115-3_7
Miguel Lagares-Lemos, Yuliana Pérez-Gallardo, Angel Lagares-Lemos, J. M. Gómez-Berbís
{"title":"ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids","authors":"Miguel Lagares-Lemos, Yuliana Pérez-Gallardo, Angel Lagares-Lemos, J. M. Gómez-Berbís","doi":"10.1007/978-3-030-71115-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-71115-3_7","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Decision Tree Algorithms for Data Warehouse Fragmentation 数据仓库碎片化决策树算法的比较分析
Studies in computational intelligence Pub Date : 2020-12-01 DOI: 10.1007/978-3-030-71115-3_15
Nidia Rodríguez-Mazahua, L. Rodríguez-Mazahua, Asdrúbal López-Chau, G. Alor-Hernández, S. G. Peláez-Camarena
{"title":"Comparative Analysis of Decision Tree Algorithms for Data Warehouse Fragmentation","authors":"Nidia Rodríguez-Mazahua, L. Rodríguez-Mazahua, Asdrúbal López-Chau, G. Alor-Hernández, S. G. Peláez-Camarena","doi":"10.1007/978-3-030-71115-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-71115-3_15","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 pandemic risk analytics: Data mining with reliability engineering methods for analyzing spreading behavior and comparison with infectious diseases COVID-19大流行风险分析:使用可靠性工程方法进行数据挖掘,分析传播行为并与传染病进行比较
Studies in computational intelligence Pub Date : 2020-11-12 DOI: 10.1101/2020.11.08.20227322
A. Puls, S. Bracke
{"title":"COVID-19 pandemic risk analytics: Data mining with reliability engineering methods for analyzing spreading behavior and comparison with infectious diseases","authors":"A. Puls, S. Bracke","doi":"10.1101/2020.11.08.20227322","DOIUrl":"https://doi.org/10.1101/2020.11.08.20227322","url":null,"abstract":"In December 2019, the world was confronted with the outbreak of the respiratory disease COVID-19 (Corona). The first infection (confirmed case) was detected in the City Wuhan, Hubei, China. First, it was an epidemic in China, but in the first quarter of 2020, it evolved into a pandemic, which continues to this day. The COVID-19 pandemic with its incredible speed of spread shows the vulnerability of a globalized and networked world. The first months of the pandemic were characterized by heavy burden on health systems. Worldwide, the population of countries was affected with severe restrictions, like educational system shutdown, public traffic system breakdown or a comprehensive lockdown. The severity of the burden was dependent on many factors, e.g. government, culture or health system. However, the burden happened regarding each country with slight time lags, cf. Bracke et al. (2020). This paper focuses on data analytics regarding infection data of the COVID-19 pandemic. It is a continuation of the research study COVID-19 pandemic data analytics: Data heterogeneity, spreading behavior, and lockdown impact, published by Bracke et al. (2020). The goal of this assessment is the evaluation/analysis of infection data mining considering model uncertainty, pandemic spreading behavior with lockdown impact and early second wave in Germany, Italy, Japan, New Zealand and France. Furthermore, a comparison with other infectious diseases (measles and influenza) is made. The used data base from Johns Hopkins University (JHU) runs from 01/22/2020 until 09/22/2020 with daily data, the dynamic development after 09/22/2020 is not considered. The measles/influenza analytics are based on Robert Koch Institute (RKI) data base 09/22/2020. Statistical models and methods from reliability engineering like Weibull distribution model or trend test are used to analyze the occurrence of infection.","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信