指责 发表于 2025-3-21 17:54:28

书目名称Cyber Security and Digital Forensics影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0241759<br><br>        <br><br>书目名称Cyber Security and Digital Forensics读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0241759<br><br>        <br><br>

刺穿 发表于 2025-3-21 23:42:29

Android Malware Detection Using Extreme Learning Machine Optimized with Swarm Intelligencethe classifier’s accuracy. The dataset consists of 1700 benign and 418 malicious Android applications from which over 15,000 features of different types were extracted, and feature selection techniques were applied. The aforementioned dataset was used to experiment our proposed model, and significan

放逐 发表于 2025-3-22 04:07:16

http://reply.papertrans.cn/25/2418/241759/241759_3.png

PAD416 发表于 2025-3-22 06:59:58

http://reply.papertrans.cn/25/2418/241759/241759_4.png

夸张 发表于 2025-3-22 09:42:07

http://reply.papertrans.cn/25/2418/241759/241759_5.png

脱毛 发表于 2025-3-22 16:26:58

Passive Video Forgery Detection Techniques to Detect Copy Move Tampering Through Feature Comparison ith the assistance of extricated highlights to check the measure of changes in the tempered frames all through the video stream. To check the uprightness of a video, include correlation and RANSAC strategies are utilized and it shows huge outcomes distinctive when checked with the video which altere

脱毛 发表于 2025-3-22 20:17:58

https://doi.org/10.1057/9780230607132ribe how fog can be used in e-Healthcare systems. In this research paper, we discuss fog computing in the context of Uttarakhand. Our main concerns are security issues and challenges faced by fog computing while using the E-Healthcare system in hilly areas of Uttarakhand. In studying those challenge

Fecundity 发表于 2025-3-23 00:59:08

http://reply.papertrans.cn/25/2418/241759/241759_8.png

滔滔不绝的人 发表于 2025-3-23 03:37:10

Seaweeds, seagrasses, and emergent plantsrotect network against blackhole attack. These set of rules are created using three AODV critical attribute which are rate of ., . and . value. The proposed FIDS, thereafter, evaluated using ns2 simulator and are found efficient to detect and isolate the attacker node from the network. The deploymen

Outmoded 发表于 2025-3-23 06:36:42

https://doi.org/10.1007/978-3-0348-7531-8gging, C4.5 (J48) and random forest classifiers are tested on the phishing dataset. The dataset is taken from UCI repository which has 1353 instances. The C4.5 classification model has the highest accuracy rate of 90.8%.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Cyber Security and Digital Forensics; Proceedings of ICCSD Kavita Khanna,Vania Vieira Estrela,Joel José Puga Conference proceedings 2022 T