删除 发表于 2025-3-28 17:37:45
Belief Manipulation: A Formal Model of Deceit in Message Passing Systemsms can be abstracted and analyzed in terms of formal belief manipulation problems. The focus of this paper is on introducing a new problem of general interest in Security, and taking the first steps towards practical application.conflate 发表于 2025-3-28 21:03:43
Detecting Web Attacks Based on Domain Statisticsputation resources and time, but also remains the efficiency benefited from execution-based detection. The results show that the proposed classification efficiently saves computing time and its practicality under large-scale web requests.jaunty 发表于 2025-3-28 23:04:50
http://reply.papertrans.cn/47/4693/469297/469297_43.png冷淡一切 发表于 2025-3-29 05:14:50
0302-9743 Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and seleear-canal 发表于 2025-3-29 09:38:48
http://reply.papertrans.cn/47/4693/469297/469297_45.png衰老 发表于 2025-3-29 12:52:33
Label Micro-blog Topics Using the Bayesian Inference Methodroduce Baidu Encyclopedia to extract effective features, and then we train efficient classifiers with the probabilistic graphic model. The proposed model can classify micro-blog content reliably. Experiments on Sina-weibo dataset demonstrate the effectiveness of the proposed method.