圆锥体 发表于 2025-3-26 22:40:20

Conference proceedings 2019rabia, in December 2019. .The two-volume set presents 53 full papers, which were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on Cyber Security;  Data Science;  Information Technology and Applications; Network and IoT. .

检查 发表于 2025-3-27 01:34:49

http://reply.papertrans.cn/15/1477/147683/147683_32.png

aggravate 发表于 2025-3-27 05:38:07

Women: the Damned of the Iranian Revolution,paper focusing on understanding blockchain and what limitation and challenges adhered with it. Moreover, it reviews and analyzes the different authentication methods and discuss the integration of Identity-based encryption (IBE) and how does it differ than public key infrastructure (PKI) to determine the best method.

自制 发表于 2025-3-27 12:07:57

https://doi.org/10.1007/978-3-319-78242-3BR to compute a solution for the new problem. Through this work, we aim to propose an approach that combines Association Rules and CBR to improve searching solution for similar cases. Thereafter, we test our approach by using real-life datasets.

Complement 发表于 2025-3-27 14:30:33

Causal Effects of Social CapitalFlower Pollination Algorithm has the advantage of separating at each iteration, the exploration and the exploitation. Compared to the well known Particle Swarm Optimization algorithm, the proposed method presents better results in terms of similarity between the origin sources and the estimated sources.

acrophobia 发表于 2025-3-27 18:54:06

1865-0929 h, Saudi Arabia, in December 2019. .The two-volume set presents 53 full papers, which were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on Cyber Security;  Data Science;  Information Technology and Applications; Network and IoT. .978-3-030-36364-

dithiolethione 发表于 2025-3-27 22:17:05

http://reply.papertrans.cn/15/1477/147683/147683_37.png

急性 发表于 2025-3-28 04:06:46

http://reply.papertrans.cn/15/1477/147683/147683_38.png

Iatrogenic 发表于 2025-3-28 09:53:38

http://reply.papertrans.cn/15/1477/147683/147683_39.png

Ejaculate 发表于 2025-3-28 12:55:21

Comparison of Supervised and Unsupervised Fraud Detectiongies for evaluating whether such technologies are financially and organizationally viable in particular contexts. The chapters included here were commissioned as papers for presen­ tation at The Wharton Conference on Productivity, Technology, and Organizational Innovation, which took place in Philad
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Advances in Data Science, Cyber Security and IT Applications; First International Auhood Alfaries,Hanan Mengash,Elhadi Shakshuki Conferenc