找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions; Álvaro Herrero,Václav Snášel,Emilio Corchado Conference procee

[复制链接]
楼主: Flange
发表于 2025-3-26 23:20:00 | 显示全部楼层
发表于 2025-3-27 03:19:29 | 显示全部楼层
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS R manner for multi-hop forwarding. Due to the mobile nature of the nodes in mobile ad hoc networks, the applications of these networks are diverse, ranging from home networking to intelligent transport, military exercises and campus network. However, this mobility of nodes makes the network vulnerabl
发表于 2025-3-27 06:58:41 | 显示全部楼层
On Fitness Function Based upon Quasigroups Power Sequences,ne on evolutionary search for quasigroups by defining fitness functions based on heterogeneous sequences generated during the exponentiation of quasigroups elements. In this paper, we explore how succeed a genetic algorithm in search for maximum of the best fitness function and some statistics about
发表于 2025-3-27 11:58:35 | 显示全部楼层
Usability of Software Intrusion-Detection System in Web Applications,n and do not rely on the other network hardware components. Discussed intrusion detection system solution is connected directly with the web application and is based on the real-time request analysis. The main opportunities of proposed principle are very low cost and simple implementation. Proposal
发表于 2025-3-27 14:43:48 | 显示全部楼层
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protectconsideration. Since RSA is a difficult problem, we make use of the Genetic Algorithm (GA) metaheuristic to provide near-optimal solutions to the problem. We investigate the effectiveness of GA for a set of network scenarios. Evaluation results show that the proposed algorithm outperforms reference
发表于 2025-3-27 19:20:37 | 显示全部楼层
Information Exchange Mechanism between Federated Domains: P2P Approach,obust, self path-replicated and resilient communication between different domains in federation (between Decision Modules), P2P technology is used. This approach allows the proposed system to overcome IP addressing issues and minimize the configuration cost. Exchanging information between federated
发表于 2025-3-27 23:39:52 | 显示全部楼层
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes,cation of security pattern as standard representation for countermeasures. Classical security pattern structure is extended to incorporate new features that enable the automatic selection of security patterns. Furthermore, a prototype has been developed which support the specification of security patterns in a graphical way.
发表于 2025-3-28 03:10:55 | 显示全部楼层
Clustering for Intrusion Detection: Network Scans as a Case of Study,e compatible and consequently applied to a continuous network flow for intrusion detection. A comprehensive experimental study has been carried out on previously generated real-life data sets. Empirical results suggest that projection and clustering techniques could work in unison to enhance MOVICAB-IDS.
发表于 2025-3-28 07:58:22 | 显示全部楼层
发表于 2025-3-28 14:26:22 | 显示全部楼层
Software Implementation of Linear Feedback Shift Registers over Extended Fields,out for diverse extended fields and different architectures. Numerical results prove that extended fields provide speedup factors up to 10.15. The benefits of these fields are clear for LFSR applications included cryptographic applications.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-10 22:17
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表