找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: International Conference on Advanced Intelligent Systems for Sustainable Development; Volume 2 - Advanced Janusz Kacprzyk,Mostafa Ezziyyan

[复制链接]
楼主: fallacy
发表于 2025-3-23 11:09:20 | 显示全部楼层
Two Levels Feature Selection Approach for Intrusion Detection System, machine learning models with an intrusion detection system (IDS) contributes to enhancing and strengthening the defense mechanism of networks and IT infrastructures. However, training a model with a large number of features or with irrelevant ones can significantly diminish the detection rate of at
发表于 2025-3-23 17:48:59 | 显示全部楼层
发表于 2025-3-23 20:40:23 | 显示全部楼层
发表于 2025-3-24 00:31:00 | 显示全部楼层
发表于 2025-3-24 02:23:11 | 显示全部楼层
,Tracking Methods: Comprehensive Vision and Multiple Approaches,ts and human beings detected to associate them with robust systems for treaties and draw the desired conclusions. Tracking generally uses several methods such as graph theory, technological tools, Internet of Things (IoT), Big Data, and artificial intelligence, where it maintains several hypotheses
发表于 2025-3-24 07:58:58 | 显示全部楼层
Multi-blockchain Scheme Based on IoT and Smart Contracts in the Agricultural Field for Data Managem people. The purpose is to collect data, construct a digital ledger, and distribute it to each participant using P2P techniques. Blockchain technology gets employed in various industries, including government, transport, commerce, and healthcare. This paper will focus on using Blockchain in the agri
发表于 2025-3-24 12:18:27 | 显示全部楼层
发表于 2025-3-24 15:29:05 | 显示全部楼层
Mapping Review of Research on Supply Chains Relocation,ic performances. In this article, we provide a mapping review of literature related to Supply chain relocation, which is a part of Supply chain design. We first start with a broad sweep of the literature to build an understanding state of the supply chain relocation models, and the criteria, charact
发表于 2025-3-24 22:44:46 | 显示全部楼层
发表于 2025-3-25 02:59:46 | 显示全部楼层
A Comparative Study of Vulnerabilities Scanners for Web Applications: Nexpose vs Acunetix,come a significant challenge due to various vulnerabilities in web applications such as XSS, SQL injection (Second order), and many others. For this aim, we have penetration tests, that plays a very important role to detect those vulnerabilities, and it is called a simulated network attack, in which
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-9 04:10
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表