BULLY 发表于 2025-3-28 15:06:54

Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approachonstration of the advantages of proposed approach on the sets of rules provided by open source Snort IDS. These techniques have been implemented and we proved the correctness of our method and demonstrated its applicability and scalability. The first results we obtained are very promising.

ORE 发表于 2025-3-28 19:48:46

Investigating the Impacts of Brain Conditions on EEG-Based Person Identificationmple (SampEn) and Conditional (CEn) entropy are employed to extract features from these two datasets. Experimental results show that both epilepsy and alcohol actually have different impacts depending on feature extraction method used in the system.

placebo-effect 发表于 2025-3-29 01:15:57

http://reply.papertrans.cn/48/4718/471725/471725_43.png

精美食品 发表于 2025-3-29 05:40:11

http://reply.papertrans.cn/48/4718/471725/471725_44.png

失望昨天 发表于 2025-3-29 07:52:58

Conference proceedings 2015ntelligence in Security for Information Systems (CISIS 2015) and the 6.th. International Conference on European Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015..The aim of the 8.th. CISIS conference is to offer a m

吞噬 发表于 2025-3-29 14:50:19

A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Cononal databases. Then, we introduce our proposal for addressing this issue. We especially focus on the verification and validation of the conformity of concrete role based access control policies in a formal environment. Finally, we illustrate the relevance of our contribution through a case of study.

DEFT 发表于 2025-3-29 16:54:09

http://reply.papertrans.cn/48/4718/471725/471725_47.png

thrombosis 发表于 2025-3-29 21:29:43

http://reply.papertrans.cn/48/4718/471725/471725_48.png

Detonate 发表于 2025-3-30 02:12:49

Performance Analysis of User to Root Attack Class Using Correlation Based Feature Selection Modelfrom the features commonly selected by correlation based feature selection with six search methods. Further, the performance comparison among seven selected subsets and complete set of features is analyzed. The simulation results show better performance using the proposed subset having only 12 features in comparison to others.

亲密 发表于 2025-3-30 06:56:53

http://reply.papertrans.cn/48/4718/471725/471725_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: International Joint Conference; CISIS’15 and ICEUTE’ Álvaro Herrero,Bruno Baruque,Emilio Corchado Conference proceedings 2015 Springer Inte