删除 发表于 2025-3-28 17:37:45

Belief Manipulation: A Formal Model of Deceit in Message Passing Systemsms can be abstracted and analyzed in terms of formal belief manipulation problems. The focus of this paper is on introducing a new problem of general interest in Security, and taking the first steps towards practical application.

conflate 发表于 2025-3-28 21:03:43

Detecting Web Attacks Based on Domain Statisticsputation resources and time, but also remains the efficiency benefited from execution-based detection. The results show that the proposed classification efficiently saves computing time and its practicality under large-scale web requests.

jaunty 发表于 2025-3-28 23:04:50

http://reply.papertrans.cn/47/4693/469297/469297_43.png

冷淡一切 发表于 2025-3-29 05:14:50

0302-9743 Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and sele

ear-canal 发表于 2025-3-29 09:38:48

http://reply.papertrans.cn/47/4693/469297/469297_45.png

衰老 发表于 2025-3-29 12:52:33

Label Micro-blog Topics Using the Bayesian Inference Methodroduce Baidu Encyclopedia to extract effective features, and then we train efficient classifiers with the probabilistic graphic model. The proposed model can classify micro-blog content reliably. Experiments on Sina-weibo dataset demonstrate the effectiveness of the proposed method.
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Intelligence and Security Informatics; Pacific Asia Worksho G. Alan Wang,Xiaolong Zheng,Hsinchun Chen Conference proceedings 2013 Springer-