Arama Sonuçları - (((( less composer ) OR ( loss composer ))) OR ((( hess computer ) OR ( threats computer ))))*

Sonuçları Daraltın
  1. 1

    Information Security Practices Emerging Threats and Perspectives /

    Baskı/Yayın Bilgisi 2017
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  2. 2
  3. 3

    Computer and Network Security Essentials

    Baskı/Yayın Bilgisi 2018
    İçindekiler: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  4. 4
  5. 5

    Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /

    Baskı/Yayın Bilgisi 2018
    İçindekiler: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  6. 6

    Secure System Design and Trustable Computing

    Baskı/Yayın Bilgisi 2016
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  7. 7

    Recent Advances in Computational Intelligence in Defense and Security

    Baskı/Yayın Bilgisi 2016
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  8. 8

    Security and Data Storage Aspect in Cloud Computing Yazar: Deshpande, Prachi S., Sharma, Subhash C., Peddoju, Sateesh K.

    Baskı/Yayın Bilgisi 2019
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  9. 9

    Cloud Computing and Big Data: Technologies, Applications and Security

    Baskı/Yayın Bilgisi 2019
    İçindekiler: “…Elliptic Curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage -- Cloud Computing: Overview and Risk Identification Based on Classification by Type -- Authentication Model for Mobile Cloud Computing Database Service -- FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module -- Issues and Threats of Cloud Data Storage -- Challenges of Crowd Sensing for Cost-effective Data Management in the Cloud -- On the Security of Medical Image Processing in Cloud Environment -- Implementations of Intrusion Detection Architectures in Cloud Computing -- Privacy in Big Data Through Variable t-Closeness for MSN Attributes -- The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption -- Support Cloud SLA establishment using MDE -- A New Parallel and Distributed Approach for Large Scale ImagesRetrieval -- Classification of Social Network Data Using a Dictionary-Based Approach -- Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes -- Workflow Scheduling Issues and Techniques in Cloud Computing: A Systematic Literature Review -- A Review of Green Cloud Computing Techniques -- Towards a smart exploitation of GPUs for low energy motion estimation using Full HD and 4K Videos -- Machine Learning applications in supply chains: Long Short-Term Memory for demand forecasting -- Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture -- Runtime prediction of optimizers using improved support vector machine -- AND/OR directed graph for dynamic web service composition -- An NLP based text-to-speech synthesizer for Moroccan Arabic -- Context-Aware Routing Protocol for Mobile WSN : Fire Forest Detection. .…”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  10. 10

    Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /

    Baskı/Yayın Bilgisi 2019
    İçindekiler: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  11. 11

    Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3 /

    Baskı/Yayın Bilgisi 2019
    İçindekiler: “…Novel Filtering-based Approach using Fuzzy Logic for Prevention of Adversaries in Sensory Application -- Game-Decision Model for Isolating Intruder & bridging Tradeoff between Energy and Security -- Simplified Framework for Resisting Lethal Incoming Threats from Polluting in Wireless Sensor Network -- An Efficient Approach towards Formal Verification of Mixed Signals using Feed-Forward Neural Network -- PCCV: Parallel Cancellation and Convolution Viterbi encoding/decoding approach for MIMO-OFDMA for efficient resource allocation and power consumption -- Streaming Analytics - Real-time Customer Satisfaction in Brick-And-Mortar Retailing -- An Efficient Mechanism to Improve the Complexity and System Performance in OFDM using Switched Beam Smart Antenna -- Modeling the Engineering Process as a Thinging Machine: A Case Study of Chip Manufacturing -- A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-hoc Networks from a Security Viewpoint -- A Technique of Adaptation of the Workload Distribution Problem Model for the Fog-Computing Environment.…”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    The NICE Cyber Security Framework Cyber Security Intelligence and Analytics / Yazar: Alsmadi, Izzat

    Baskı/Yayın Bilgisi 2019
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  19. 19

    Managing the Complexity of Critical Infrastructures A Modelling and Simulation Approach /

    Baskı/Yayın Bilgisi 2016
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  20. 20

    Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 2 /

    Baskı/Yayın Bilgisi 2017
    İçindekiler: “…Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap