CRUE 发表于 2025-3-25 04:33:54

Lessons from the Gold Standard Experience, a victim that must not be exceeded in order to suppress the number of infected hosts to less than a few. This model can appropriately express the early state under which an infection started. The result from our model fits very well to the result of computer simulation using a typical existing scanning malware and an actual network.

Cardiac-Output 发表于 2025-3-25 09:17:23

http://reply.papertrans.cn/31/3002/300193/300193_22.png

muster 发表于 2025-3-25 14:54:14

Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model a victim that must not be exceeded in order to suppress the number of infected hosts to less than a few. This model can appropriately express the early state under which an infection started. The result from our model fits very well to the result of computer simulation using a typical existing scanning malware and an actual network.

悠然 发表于 2025-3-25 16:34:49

struct usage behavior rules of interesting customer groups. Finally, these rules are used to analysis the behavior changes between time periods t and t+1. An implementation case using a practical credit card database provided by a commercial bank in Taiwan is illustrated to show the benefits of the proposed framework.

造反,叛乱 发表于 2025-3-25 20:26:35

It is supported also by a generic ontological framework based on which different domain specific fraud knowledge models can be built and through which the generic character and adaptability of our approach is ensured.

deceive 发表于 2025-3-26 03:18:31

,Warfare in the Old Regime 1648–1789, used normalization technique in SVM fusion systems. The prosodic and speech spectrum scores have been provided by speech experts using records of the Switchboard I database and the face scores have been obtained by a face recognition system upon XM2VTS database.

PHAG 发表于 2025-3-26 05:49:14

http://reply.papertrans.cn/31/3002/300193/300193_27.png

savage 发表于 2025-3-26 08:55:59

propose different query methods for the two databases, and we compare them through simulation. Two different versions of the architecture are presented: the first is a serial architecture that is able to perform up to 7.5 million queries per second; the second is a multithreaded architecture that can perform up to 11 million queries per second.

Mitigate 发表于 2025-3-26 13:19:44

http://reply.papertrans.cn/31/3002/300193/300193_29.png

poliosis 发表于 2025-3-26 17:43:15

An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains It is supported also by a generic ontological framework based on which different domain specific fraud knowledge models can be built and through which the generic character and adaptability of our approach is ensured.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: E-business and Telecommunications; 4th International Co Joaquim Filipe,Mohammad S. Obaidat Conference proceedings 2009 Springer-Verlag Berl