Studies in computational intelligence最新文献

筛选
英文 中文
Developing a Blockchain-Based and Distributed Database-Oriented Multi-malware Detection Engine 基于区块链和分布式数据库的多恶意软件检测引擎的开发
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_11
S. Gupta, Parag P. Thakur, Kamal Biswas, Satyajeet Kumar, Aman Singh
{"title":"Developing a Blockchain-Based and Distributed Database-Oriented Multi-malware Detection Engine","authors":"S. Gupta, Parag P. Thakur, Kamal Biswas, Satyajeet Kumar, Aman Singh","doi":"10.1007/978-3-030-57024-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_11","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Based Secure Change Management 基于机器学习的安全变更管理
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_23
Mounia Zaydi, B. Nassereddine
{"title":"A Machine Learning Based Secure Change Management","authors":"Mounia Zaydi, B. Nassereddine","doi":"10.1007/978-3-030-57024-8_23","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_23","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"498 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian Networks for Online Cybersecurity Threat Detection 在线网络安全威胁检测的贝叶斯网络
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_6
Mauro José Pappaterra, Francesco Flammini
{"title":"Bayesian Networks for Online Cybersecurity Threat Detection","authors":"Mauro José Pappaterra, Francesco Flammini","doi":"10.1007/978-3-030-57024-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_6","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network IntAnti-Phish:基于反向传播神经网络的智能反网络钓鱼框架
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_9
Sheikh Shah Mohammad Motiur Rahman, Lakshman Gope, Takia Islam, M. Alazab
{"title":"IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network","authors":"Sheikh Shah Mohammad Motiur Rahman, Lakshman Gope, Takia Islam, M. Alazab","doi":"10.1007/978-3-030-57024-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_9","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Deep Learning Model to Secure Internet of Things in Healthcare 一种新的深度学习模型来保护医疗保健中的物联网
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_15
Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, M. Alazab, A. Jolfaei, Asad Ullah, Uzair Saeed
{"title":"A Novel Deep Learning Model to Secure Internet of Things in Healthcare","authors":"Usman Ahmad, Hong Song, Awais Bilal, Shahid Mahmood, M. Alazab, A. Jolfaei, Asad Ullah, Uzair Saeed","doi":"10.1007/978-3-030-57024-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_15","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intermediary Technical Interoperability Component TIC Connecting Heterogeneous Federation Systems 连接异构联邦系统的中间技术互操作性组件TIC
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_24
Hasnae L'Amrani, Y. Idrissi, R. Ajhoun
{"title":"Intermediary Technical Interoperability Component TIC Connecting Heterogeneous Federation Systems","authors":"Hasnae L'Amrani, Y. Idrissi, R. Ajhoun","doi":"10.1007/978-3-030-57024-8_24","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_24","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Application Security Using Static and Dynamic Analysis 使用静态和动态分析的移动应用程序安全性
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_20
H. Shahriar, Chi Zhang, Arabin Islam Talukder, Saiful Islam
{"title":"Mobile Application Security Using Static and Dynamic Analysis","authors":"H. Shahriar, Chi Zhang, Arabin Islam Talukder, Saiful Islam","doi":"10.1007/978-3-030-57024-8_20","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_20","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ameliorated Face and Iris Recognition Using Deep Convolutional Networks 利用深度卷积网络改进人脸和虹膜识别
Studies in computational intelligence Pub Date : 2020-12-15 DOI: 10.1007/978-3-030-57024-8_12
B. Muthazhagan, Suriya Sundaramoorthy
{"title":"Ameliorated Face and Iris Recognition Using Deep Convolutional Networks","authors":"B. Muthazhagan, Suriya Sundaramoorthy","doi":"10.1007/978-3-030-57024-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-57024-8_12","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115136358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids ENERMONGRID:智能电网的智能能源监测、可视化和欺诈检测
Studies in computational intelligence Pub Date : 2020-12-01 DOI: 10.1007/978-3-030-71115-3_7
Miguel Lagares-Lemos, Yuliana Pérez-Gallardo, Angel Lagares-Lemos, J. M. Gómez-Berbís
{"title":"ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids","authors":"Miguel Lagares-Lemos, Yuliana Pérez-Gallardo, Angel Lagares-Lemos, J. M. Gómez-Berbís","doi":"10.1007/978-3-030-71115-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-71115-3_7","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Decision Tree Algorithms for Data Warehouse Fragmentation 数据仓库碎片化决策树算法的比较分析
Studies in computational intelligence Pub Date : 2020-12-01 DOI: 10.1007/978-3-030-71115-3_15
Nidia Rodríguez-Mazahua, L. Rodríguez-Mazahua, Asdrúbal López-Chau, G. Alor-Hernández, S. G. Peláez-Camarena
{"title":"Comparative Analysis of Decision Tree Algorithms for Data Warehouse Fragmentation","authors":"Nidia Rodríguez-Mazahua, L. Rodríguez-Mazahua, Asdrúbal López-Chau, G. Alor-Hernández, S. G. Peláez-Camarena","doi":"10.1007/978-3-030-71115-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-71115-3_15","url":null,"abstract":"","PeriodicalId":163967,"journal":{"name":"Studies in computational intelligence","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信