Oligarchy 发表于 2025-3-26 23:16:22

http://reply.papertrans.cn/24/2325/232459/232459_31.png

爱管闲事 发表于 2025-3-27 03:36:32

http://reply.papertrans.cn/24/2325/232459/232459_32.png

arbiter 发表于 2025-3-27 05:34:51

http://reply.papertrans.cn/24/2325/232459/232459_33.png

ARM 发表于 2025-3-27 10:15:55

http://reply.papertrans.cn/24/2325/232459/232459_34.png

Inscrutable 发表于 2025-3-27 14:12:11

http://reply.papertrans.cn/24/2325/232459/232459_35.png

fidelity 发表于 2025-3-27 18:24:26

http://reply.papertrans.cn/24/2325/232459/232459_36.png

entrance 发表于 2025-3-27 23:06:35

http://reply.papertrans.cn/24/2325/232459/232459_37.png

柔声地说 发表于 2025-3-28 03:56:25

http://reply.papertrans.cn/24/2325/232459/232459_38.png

Endearing 发表于 2025-3-28 10:04:01

Evolutionary Computation in Computer Security and Forensics: An Overview,icient way to solve those associated with computer security and forensics. This chapter examines the approaches evolutionary computation offers to discover an optimal solution to a problem. Moreover, it overviews how evolutionary computation can be applied to different scenarios related to computer security and forensics.

moratorium 发表于 2025-3-28 13:30:25

Book 2012iew of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security. .
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Computational Intelligence for Privacy and Security; David A. Elizondo,Agusti Solanas,Antoni Martinez-B Book 2012 Springer Berlin Heidelbe