地名词典 发表于 2025-3-25 06:27:05

https://doi.org/10.1007/978-3-8349-3640-0itioning paper poses an optimization challenge in the design of such correlation engine and a number of directions for research. We present a novel approach for automatic generation of security event correlation rules based on Genetic Programming which has been already used at sensor level.

SOW 发表于 2025-3-25 10:31:19

https://doi.org/10.1007/978-3-8349-3640-0tives. We leverage state information in event data to summarize loop structures in sequences which, in turn, leads to better classification of program behavior. We have performed initial validations of these techniques using Asterisk., a widely deployed, open source digital PBX.

grenade 发表于 2025-3-25 11:56:08

https://doi.org/10.1007/978-3-8349-4058-2pular score normalization techniques (z-norm, tanh, MAD, etc), and proposes a new score normalization procedure with an optimized performance harnessing tested fusion techniques and outperforming previous results through a proof-of-concept implementation.

旋转一周 发表于 2025-3-25 16:22:03

http://reply.papertrans.cn/24/2326/232536/232536_24.png

减少 发表于 2025-3-25 21:23:54

http://reply.papertrans.cn/24/2326/232536/232536_25.png

灌输 发表于 2025-3-26 03:53:39

http://reply.papertrans.cn/24/2326/232536/232536_26.png

insurrection 发表于 2025-3-26 07:29:04

http://reply.papertrans.cn/24/2326/232536/232536_27.png

越自我 发表于 2025-3-26 12:11:54

Multimodal Biometrics: Topics in Score Fusionpular score normalization techniques (z-norm, tanh, MAD, etc), and proposes a new score normalization procedure with an optimized performance harnessing tested fusion techniques and outperforming previous results through a proof-of-concept implementation.

kindred 发表于 2025-3-26 14:47:50

https://doi.org/10.1007/978-3-642-48199-4 system which currently requires a human online monitoring or an offline signal processing. The research proposed here, by means of a windowing of the signals, uses Support Vector Machines for classification, as tool for the detection problem. Empirical results show the effectiveness of the method.

诗集 发表于 2025-3-26 17:27:07

https://doi.org/10.1007/978-3-663-11546-5f the multi-agent systems and the self-adaption ability to the changes that occur in the patterns of attack. A prototype of the architecture was developed and the results obtained are presented in this study.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern Álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen