Inexorable 发表于 2025-3-23 11:47:54

http://reply.papertrans.cn/43/4225/422482/422482_11.png

忍受 发表于 2025-3-23 16:54:12

sses how AI can enable real-time monitoring, predictive maintenance, and automated response systems to build resilient infrastructure. A comprehensive review of case studies and emerging technologies provides valuable insights into how AI can be used to safeguard critical infrastructure in the face of dynamic challenges and evolving threats.

确定方向 发表于 2025-3-23 19:06:03

http://reply.papertrans.cn/43/4225/422482/422482_13.png

被告 发表于 2025-3-24 01:55:53

http://reply.papertrans.cn/43/4225/422482/422482_14.png

先兆 发表于 2025-3-24 03:25:31

Decision Support Systems in Transportationransportation-focused DSS-s as well as current information technologies applied in those systems are reported. The chapter includes a review of 43 DSS-s applied by different transportation sectors, such as: road, urban, air, rail and seaborne transportation.

innate 发表于 2025-3-24 08:21:00

http://reply.papertrans.cn/43/4225/422482/422482_16.png

Scleroderma 发表于 2025-3-24 12:15:01

ed in cybersecurity. As digital threats become increasingly sophisticated and complex, conventional cybersecurity approaches are becoming inadequate. The chapter explores how machine learning and deep learning algorithms can enhance threat detection, anomaly analysis, and overall security posture. U

ablate 发表于 2025-3-24 18:07:59

http://reply.papertrans.cn/43/4225/422482/422482_18.png

BILL 发表于 2025-3-24 20:03:53

Chee Peng Lim,Lakhmi C. Jainhapter outlines the diverse landscape of AI variants, as well as their diverse real-world applications in bolstering cybersecurity. The discourse explores the importance of explainable AI and emphasizes the need for transparent models to increase interpretability and user trust in cybersecurity appl

OATH 发表于 2025-3-25 01:53:49

M. Mora,G. Forgionne,F. Cervantes-Pérez,O. Gelmanand MITRE ATT&CK, as well as the cybersecurity life cycle. In this chapter, key terms regarding threats, vulnerabilities, security controls, and relevant emerging technologies associated with AI are clarified, enabling effective communication within the cybersecurity field. Examining attack framewor
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Handbook on Decision Making; Vol 1: Techniques an Lakhmi C. Jain,Chee Peng Lim Book 2010 Springer-Verlag Berlin Heidelberg 2010 Transport.a