Strength 发表于 2025-3-23 11:54:12

1860-949X nicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence..978-3-642-09016-5978-3-540-71078-3Series ISSN 1860-949X Series E-ISSN 1860-9503

brassy 发表于 2025-3-23 15:34:34

Nadia Nedjah,Ajith Abraham,Luiza de Macedo MourellPresents recent advances of Computational Intelligence in Information Assurance and Security.Includes supplementary material:

jaundiced 发表于 2025-3-23 19:24:44

http://reply.papertrans.cn/24/2326/232506/232506_13.png

一回合 发表于 2025-3-24 00:44:25

Computational Intelligence in Information Assurance and Security978-3-540-71078-3Series ISSN 1860-949X Series E-ISSN 1860-9503

铁塔等 发表于 2025-3-24 04:11:10

https://doi.org/10.1007/978-3-540-71078-3Security; algorithms; cognition; communication; computational intelligence; computer-aided design (CAD); d

Geyser 发表于 2025-3-24 06:48:36

http://reply.papertrans.cn/24/2326/232506/232506_16.png

LAIR 发表于 2025-3-24 12:52:45

http://reply.papertrans.cn/24/2326/232506/232506_17.png

Microaneurysm 发表于 2025-3-24 17:50:10

Genevra KornbluthIn this chapter we briefly discuss two extensions of the results described in Chaps. . and ., which combine stability and instability properties in a single framework or combine stability and instability through hybrid switching strategies. The two approaches described here, are based on the papers .

组成 发表于 2025-3-24 20:16:51

Understanding Organizational Culture: Values,I agree it needs clarification. Need culture too imply value? But in my coining the phrase, I have differentiated between short-term and long-term goals. A need ­culture signifies urgency and, in patterns, it reflects speed and satisfaction in this case; therefore, values so chosen are of immediate concern rather than stable or futuristic concern.

环形 发表于 2025-3-25 02:52:39

Jainik MehtaThe paper describes the use of DEA method for comparing cities with each other. The DEA description includes an illustrative example showing the differences between VRS, CRS, and FDH models. The paper also describes the software application that is developed for the purpose to compare the efficiency of municipalities.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Computational Intelligence in Information Assurance and Security; Nadia Nedjah,Ajith Abraham,Luiza de Macedo Mourell Book 2007 Springer-Ve