International Conferences on Networking, Information Systems & Security最新文献

筛选
英文 中文
A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning Algorithms 基于组合机器学习算法的网络流量分析和入侵检测实时智能代理
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_21
Nadiya El Kamel, M. Eddabbah, Youssef Lmoumen, R. Touahni
{"title":"A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning Algorithms","authors":"Nadiya El Kamel, M. Eddabbah, Youssef Lmoumen, R. Touahni","doi":"10.1007/978-981-16-3637-0_21","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_21","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116462426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H-RCBAC: Hadoop Access Control Based on Roles and Content H-RCBAC:基于角色和内容的Hadoop访问控制
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_30
Sarah Nait Bahloul, Karim Bessaoud, M. Abid
{"title":"H-RCBAC: Hadoop Access Control Based on Roles and Content","authors":"Sarah Nait Bahloul, Karim Bessaoud, M. Abid","doi":"10.1007/978-981-16-3637-0_30","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_30","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BPMN to UML Class Diagram Using QVT 使用QVT的BPMN到UML类图
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_42
Mohamed Achraf Habri, R. Esbai, Yasser Lamlili El Mazoui Nadori
{"title":"BPMN to UML Class Diagram Using QVT","authors":"Mohamed Achraf Habri, R. Esbai, Yasser Lamlili El Mazoui Nadori","doi":"10.1007/978-981-16-3637-0_42","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_42","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location Finder Mobile Application Using Android and Google SpreadSheets 位置查找移动应用程序使用Android和谷歌电子表格
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_51
Adeosun Nehemiah Olufemi, M. Şah
{"title":"Location Finder Mobile Application Using Android and Google SpreadSheets","authors":"Adeosun Nehemiah Olufemi, M. Şah","doi":"10.1007/978-981-16-3637-0_51","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_51","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving Privacy in a Smart Healthcare System Based on IoT 基于物联网的智能医疗系统隐私保护
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_33
Rabie Barhoun, M. Ed-Daibouni
{"title":"Preserving Privacy in a Smart Healthcare System Based on IoT","authors":"Rabie Barhoun, M. Ed-Daibouni","doi":"10.1007/978-981-16-3637-0_33","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_33","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MmRPL: QoS Aware Routing for Internet of Multimedia Things MmRPL:多媒体物联网的QoS感知路由
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_10
Hadjer Bouzebiba, O. Abdelkader
{"title":"MmRPL: QoS Aware Routing for Internet of Multimedia Things","authors":"Hadjer Bouzebiba, O. Abdelkader","doi":"10.1007/978-981-16-3637-0_10","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_10","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of Deep Learning Models in 5G Networks: Proposition of Security Assessment Process 5G网络中深度学习模型的安全性:安全评估过程的命题
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_28
Asmaa Ftaimi, T. Mazri
{"title":"Security of Deep Learning Models in 5G Networks: Proposition of Security Assessment Process","authors":"Asmaa Ftaimi, T. Mazri","doi":"10.1007/978-981-16-3637-0_28","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_28","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtual Spider for Real-Time Finding Things Close to Pedestrians 虚拟蜘蛛实时寻找接近行人的东西
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_53
Souhail Elkaissi, A. Boulmakoul
{"title":"Virtual Spider for Real-Time Finding Things Close to Pedestrians","authors":"Souhail Elkaissi, A. Boulmakoul","doi":"10.1007/978-981-16-3637-0_53","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_53","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Students Motivation Through Gamified Hybrid Learning Environments Bleurabbit Case Study 通过游戏化混合学习环境提高学生的学习动机bleurrabbit案例研究
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_40
M. Berehil
{"title":"Boosting Students Motivation Through Gamified Hybrid Learning Environments Bleurabbit Case Study","authors":"M. Berehil","doi":"10.1007/978-981-16-3637-0_40","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_40","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130950019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-Driven Engineering: From SQL Relational Database to Column - Oriented Database in Big Data Context 模型驱动工程:大数据环境下从SQL关系数据库到面向列数据库
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_47
Fatima Zahra Belkadi, R. Esbai
{"title":"Model-Driven Engineering: From SQL Relational Database to Column - Oriented Database in Big Data Context","authors":"Fatima Zahra Belkadi, R. Esbai","doi":"10.1007/978-981-16-3637-0_47","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_47","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131302674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信