International Conferences on Networking, Information Systems & Security最新文献

筛选
英文 中文
Formulating Quizzes Questions Using Artificial Intelligent Techniques 使用人工智能技术制定测验问题
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_38
A. Gourari, M. Raoufi, M. Skouri
{"title":"Formulating Quizzes Questions Using Artificial Intelligent Techniques","authors":"A. Gourari, M. Raoufi, M. Skouri","doi":"10.1007/978-981-16-3637-0_38","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_38","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination 具有导频污染的空间相关信道的海量MIMO系统信道估计
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_11
M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani
{"title":"Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination","authors":"M. Boulouird, Jamal Amadid, Abdelhamid Riadi, M. Hassani","doi":"10.1007/978-981-16-3637-0_11","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_11","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"102 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental Concepts 集成商业智能与云计算:最新技术和基本概念
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_14
Hind El Ghalbzouri, J. E. Bouhdidi
{"title":"Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental Concepts","authors":"Hind El Ghalbzouri, J. E. Bouhdidi","doi":"10.1007/978-981-16-3637-0_14","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_14","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Social Spider Colony Optimization for Global Optimization 一种用于全局优化的增强社会蜘蛛群优化算法
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_55
Farouq Zitouni, S. Harous, R. Maamri
{"title":"An Enhanced Social Spider Colony Optimization for Global Optimization","authors":"Farouq Zitouni, S. Harous, R. Maamri","doi":"10.1007/978-981-16-3637-0_55","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_55","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks 移动Ad Hoc网络中网络层攻击的比较研究
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_27
Oussama Sbai, M. Elboukhari
{"title":"Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks","authors":"Oussama Sbai, M. Elboukhari","doi":"10.1007/978-981-16-3637-0_27","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_27","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF 基于NIST CSF的加密勒索软件对策设计方法
International Conferences on Networking, Information Systems & Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-3637-0_26
Hector Torres-Calderon, Marco Velasquez, David Mauricio
{"title":"Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF","authors":"Hector Torres-Calderon, Marco Velasquez, David Mauricio","doi":"10.1007/978-981-16-3637-0_26","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_26","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信