Coterminous 发表于 2025-4-1 05:54:07

Soft Computing Techniques for Internet Backbone Traffic Anomaly DetectionThe detection of anomalies and faults is a fundamental task for different fields, especially in real cases like LAN networks and the Internet. We present an experimental study of anomaly detection on a simulated Internet backbone network based on neural networks, particle swarms, and artificial immune systems.

我就不公正 发表于 2025-4-1 09:06:14

https://doi.org/10.1007/978-3-642-01129-0Augmented Reality; Automat; ad-hoc networks; ant colony optimization; artificial life; bio-inspired algor

停止偿付 发表于 2025-4-1 12:53:09

978-3-642-01128-3Springer-Verlag Berlin Heidelberg 2009

interior 发表于 2025-4-1 15:13:52

Howard R. Champion FRCS (Edin) FACSks. This class of attacks relates to malicious activity of an intruder against applications, which use a database for storing data. The application uses SQL to retrieve data from the database and web server mechanisms to put them in a web browser. A poor implementation allows an attacker to modify S

moribund 发表于 2025-4-1 21:07:09

http://reply.papertrans.cn/16/1595/159410/159410_65.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Applications of Evolutionary Computing; EvoWorkshops 2009: E Mario Giacobini,Anthony Brabazon,Penousal Machado Conference proceedings 2009