External-Otitis 发表于 2025-3-21 19:03:24

书目名称Computational Intelligence in Security for Information Systems影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0232535<br><br>        <br><br>书目名称Computational Intelligence in Security for Information Systems读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0232535<br><br>        <br><br>

Interstellar 发表于 2025-3-21 21:12:42

Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.

痛恨 发表于 2025-3-22 02:49:06

http://reply.papertrans.cn/24/2326/232535/232535_3.png

猛然一拉 发表于 2025-3-22 05:45:23

http://reply.papertrans.cn/24/2326/232535/232535_4.png

Hyperplasia 发表于 2025-3-22 11:03:32

http://reply.papertrans.cn/24/2326/232535/232535_5.png

禁令 发表于 2025-3-22 16:47:10

https://doi.org/10.1007/978-3-322-89097-9. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.

禁令 发表于 2025-3-22 17:18:50

http://reply.papertrans.cn/24/2326/232535/232535_7.png

痛苦一生 发表于 2025-3-23 00:56:35

http://reply.papertrans.cn/24/2326/232535/232535_8.png

Incise 发表于 2025-3-23 05:09:22

A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Prob

柳树;枯黄 发表于 2025-3-23 07:21:34

Computational Intelligence in Security for Information Systems4th International Co
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Computational Intelligence in Security for Information Systems; 4th International Co Álvaro Herrero,Emilio Corchado Conference proceedings