驱逐 发表于 2025-3-21 18:52:08

书目名称Intelligence and Security Informatics影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0469295<br><br>        <br><br>书目名称Intelligence and Security Informatics读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0469295<br><br>        <br><br>

多样 发表于 2025-3-21 23:56:54

http://reply.papertrans.cn/47/4693/469295/469295_2.png

clarify 发表于 2025-3-22 02:22:31

Identifying Controversial Issues and Their Sub-topics in News Articlestempts to capture the relationship between the identified issue phrase and the candidate subtopic phrase. Through an experiment and analysis using the MPQA corpus consisting of news articles, we found that the proposed method is promising for both of the tasks although many additional research issues remain to be tapped in the future.

Cabinet 发表于 2025-3-22 07:54:54

Combined Detection Model for Criminal Network Detectionew combined model is developed and called as combined detection model (ComDM). ComDM uses crime location, date and modus operandi similarity as well as surname and hometown similarity to detect criminal networks in crime data. ComDM is tested on two datasets and performed better than other models.

Processes 发表于 2025-3-22 10:40:14

An Association Model for Implicit Crime Link Analysiseldom used to establish relationships between crime entities. This paper proposes an association model based on modus operandi and geographic relationship to establish links among crime cases and criminals. A data collection from local police department is used for experiment to evaluate the performance of the proposed approach.

我还要背着他 发表于 2025-3-22 13:49:03

http://reply.papertrans.cn/47/4693/469295/469295_6.png

宽宏大量 发表于 2025-3-22 18:36:42

Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Modelnder the without random oracles model including a signcryption scheme by Yu et al. and a certificateless signcryption scheme by Liu et al. . We give the chosen plaintext attacks to prove that the proposed previous schemes cannot resist on the indistinguishability on chosen ciphertext attack to support semantic secure for confidentiality.

情节剧 发表于 2025-3-22 23:56:33

A Model for Detecting “Global Footprint Anomalies” in a Grid Environmentl .. In this paper, we propose two classes of global anomalies, and a model for detection of a class of global anomalies that we call .. The main challenge here is to detect anomalous behavior, which looks normal locally at any individual grid node, but when observed globally, the anomalous behavior is apparent.

发芽 发表于 2025-3-23 05:24:52

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard ModelAfter given the scheme model and security definitions, a fuzzy biometric signcryption scheme in the standard model is proposed and then then security are analyzed including indistinguishable against adaptively chosen ciphertext attack and existentially unforgeable against adaptively chosen message attack.

尊敬 发表于 2025-3-23 08:46:18

Key Independent Decryption of Graphically Encrypted ImagesDecryption scheme is based on neighbourhood similarity characteristics of adjacent pixels. Simulation results show that the decrypted images obtained by the proposed scheme are quite intelligible to understand. The graphical encryption method in present form is not suitable for security applications as encrypted images can be decrypted easily.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Intelligence and Security Informatics; Pacific Asia Worksho Hsinchun Chen,Michael Chau,G. Alan Wang Conference proceedings 2010 Springer-Ve