FLAIL 发表于 2025-3-26 21:28:11

Security, Privacy and Data Analytics978-981-99-3569-7Series ISSN 1876-1100 Series E-ISSN 1876-1119

LIMN 发表于 2025-3-27 05:05:30

http://reply.papertrans.cn/87/8637/863631/863631_32.png

appall 发表于 2025-3-27 09:14:20

http://reply.papertrans.cn/87/8637/863631/863631_33.png

SCORE 发表于 2025-3-27 12:02:12

http://reply.papertrans.cn/87/8637/863631/863631_34.png

百科全书 发表于 2025-3-27 13:42:40

Slow TCP Port Scan Detection Using Flow Data,tropy values of flow parameters. The detection capability of the system is evaluated using two benchmark datasets. The result obtained shows that the flow data can be used to detect slow scan attacks effectively.

exquisite 发表于 2025-3-27 18:48:51

http://reply.papertrans.cn/87/8637/863631/863631_36.png

卵石 发表于 2025-3-27 22:05:02

http://reply.papertrans.cn/87/8637/863631/863631_37.png

Deduct 发表于 2025-3-28 04:25:22

Vision-Based Weather Condition Recognition for Driver Assistance,e Gray-Level Co-occurrence Matrix technique was used to collect weather-related attributes, and the necessary data processing was done. The system achieves a weather forecast accuracy of roughly 89.86%.

DALLY 发表于 2025-3-28 06:45:07

http://reply.papertrans.cn/87/8637/863631/863631_39.png

金盘是高原 发表于 2025-3-28 11:11:23

,Secured Workflow Scheduling Techniques in Cloud: A Survey, research works that investigate the mentioned problem. Additionally, we highlight and discuss limitations, gaps and problem aspects that are not sufficiently investigated in the literature, as well as future research challenges.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Security, Privacy and Data Analytics; Select Proceedings o Udai Pratap Rao,Mamoun Alazab,Pethuru Raj Chelliah Conference proceedings 2023 T