新义 发表于 2025-3-23 11:55:15

https://doi.org/10.1007/978-3-031-14649-7p alleviate deception to some extent by providing arguments for the selection of a particular actor/actors responsible for the attack based on the evidence. In Chap. ., we provided results showing how such models afford significant performance improvements over approaches based solely on machine learning techniques.

Jargon 发表于 2025-3-23 14:46:52

http://reply.papertrans.cn/17/1622/162153/162153_12.png

tenosynovitis 发表于 2025-3-23 20:55:35

http://reply.papertrans.cn/17/1622/162153/162153_13.png

不满分子 发表于 2025-3-24 00:22:26

http://reply.papertrans.cn/17/1622/162153/162153_14.png

扩音器 发表于 2025-3-24 03:36:28

http://reply.papertrans.cn/17/1622/162153/162153_15.png

Aqueous-Humor 发表于 2025-3-24 08:54:03

http://reply.papertrans.cn/17/1622/162153/162153_16.png

G-spot 发表于 2025-3-24 13:30:32

http://reply.papertrans.cn/17/1622/162153/162153_17.png

陈列 发表于 2025-3-24 15:04:38

http://reply.papertrans.cn/17/1622/162153/162153_18.png

让步 发表于 2025-3-24 22:48:31

http://reply.papertrans.cn/17/1622/162153/162153_19.png

可转变 发表于 2025-3-25 01:36:29

http://reply.papertrans.cn/17/1622/162153/162153_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Artificial Intelligence Tools for Cyber Attribution; Eric Nunes,Paulo Shakarian,Andrew Ruef Book 2018 The Author(s) 2018 Cyber security.Cy