万灵药 发表于 2025-3-21 16:16:04

书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0461204<br><br>        <br><br>书目名称Illumination of Artificial Intelligence in Cybersecurity and Forensics读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0461204<br><br>        <br><br>

刺激 发表于 2025-3-21 23:38:51

A Practical Experience Applying Security Audit Techniques in An Industrial Healthcare System,ed as possible. The results of this study include a security audit on an industrial scenario currently in production. An exploitation and vulnerability analysis has been performed, and more that 450 vulnerabilities has been found. This chapter outlines a systematic approach using artificial intellig

搬运工 发表于 2025-3-22 00:52:21

http://reply.papertrans.cn/47/4613/461204/461204_3.png

逢迎春日 发表于 2025-3-22 07:42:34

Intrusion Detection Using Anomaly Detection Algorithm and Snort,r simplicity in classification. The result shows the outlier value for each item considered; a 1 depicts an attack, a 0 depicts normalcy. The results are promising in dictating intrusion and anomalies in an IDS system.

Nibble 发表于 2025-3-22 10:02:02

http://reply.papertrans.cn/47/4613/461204/461204_5.png

中止 发表于 2025-3-22 16:03:47

http://reply.papertrans.cn/47/4613/461204/461204_6.png

CANT 发表于 2025-3-22 20:35:09

http://reply.papertrans.cn/47/4613/461204/461204_7.png

微尘 发表于 2025-3-22 22:55:19

A Systematic Literature Review on Face Morphing Attack Detection (MAD),elded 2089 papers. Based on the study topic, 33 primary studies were eventually considered. A novel taxonomy of the strategies utilized in MAD for feature extraction is one of the research‘s contributions. The study also discovered that (1) single and differential image-based approaches are the comm

绑架 发表于 2025-3-23 04:19:12

http://reply.papertrans.cn/47/4613/461204/461204_9.png

密码 发表于 2025-3-23 07:42:18

A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain,servation, and analysis of digital evidence. Artificial Intelligence is predominant in many areas and momentum is gaining to utilize it in the field of forensics. This chapter reviews the application of forensics using Artificial Intelligence in the field of Cloud computing, IoT, and Blockchain Tech
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Illumination of Artificial Intelligence in Cybersecurity and Forensics; Sanjay Misra,Chamundeswari Arumugam Book 2022 The Editor(s) (if ap