Invertebrate 发表于 2025-3-28 17:26:18

Álvaro Herrero,Paolo Gastaldo,Emilio CorchadoPresents latest research in Computational Intelligence in Security for Information Systems.Proceedings of the CISIS‘09 Workshop: 23rd-26th September, 2009 held in Burgos

痴呆 发表于 2025-3-28 22:03:59

Advances in Intelligent and Soft Computinghttp://image.papertrans.cn/c/image/232536.jpg

Evacuate 发表于 2025-3-28 23:37:08

Computational Intelligence in Security for Information Systems978-3-642-04091-7Series ISSN 1867-5662 Series E-ISSN 1867-5670

Clumsy 发表于 2025-3-29 05:19:53

http://reply.papertrans.cn/24/2326/232536/232536_44.png

笼子 发表于 2025-3-29 09:41:37

http://reply.papertrans.cn/24/2326/232536/232536_45.png

FOLD 发表于 2025-3-29 11:32:16

https://doi.org/10.1007/978-3-658-44736-6For that, based on real security event logs, two different clustering strategies have been developed. On the one hand, a clustering process has been carried out taking into account the characteristics that define the events in a quantitative way. On the other hand, an approach based on qualitative a

地名表 发表于 2025-3-29 16:53:51

http://reply.papertrans.cn/24/2326/232536/232536_47.png

评论性 发表于 2025-3-29 21:45:30

https://doi.org/10.1007/978-3-642-48199-4stem with an auxiliary array of magnetic sensors can improve the effectiveness of the intruder detection system. One of the major issues that arise from the integrated magnetic and acoustic system is the interpretation of the magnetic signals coming from the sensors. In this paper a machine learning

MEEK 发表于 2025-3-30 01:39:51

http://reply.papertrans.cn/24/2326/232536/232536_49.png

Stagger 发表于 2025-3-30 04:35:56

http://reply.papertrans.cn/24/2326/232536/232536_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern Álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen