Arama Sonuçları - (threads OR threats) (computer programs)
Önerilen Konular
Önerilen Konular
- Computational Intelligence 3
- Computational intelligence 3
- Artificial Intelligence 2
- Artificial intelligence 2
- Control engineering 2
- Control theory 2
- System theory 2
- Systems Theory, Control 2
- Applied Dynamical Systems 1
- Artificial intelligence, Congresses 1
- Automation 1
- Biomedical Engineering and Bioengineering 1
- Biomedical engineering 1
- C++ (Computer program language) 1
- C++ (Langage de programmation) 1
- Chemistry 1
- Climate Sciences 1
- Climatology 1
- Communications Engineering, Networks 1
- Computational Chemistry 1
- Computer Engineering and Networks 1
- Computer System Implementation 1
- Computer architecture 1
- Computer engineering 1
- Computer networks 1
- Computer systems 1
- Control and Systems Theory 1
- Control, Robotics, Automation 1
- Data Mining and Knowledge Discovery 1
- Data and Information Security 1
Şunu mu demek istediniz:
- computer programs »
-
1
Mastering C++ multithreading : a comprehensive guide to developing effective multithreading applications in C++ /
Baskı/Yayın Bilgisi Packt Publishing, 2017.Konular: Full-text access
e-Kitap -
2
Computer Simulation of Polymeric Materials Applications of the OCTA System /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.Full-text access
e-Kitap -
3
Systems Engineering in Context Proceedings of the 16th Annual Conference on Systems Engineering Research /
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Kitap -
4
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 2 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.İçindekiler: “…Multi-objective IT Professionals' Utilization ProblemsUsing Fuzzy Goal Programming -- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing -- Chapter 22. …”
Full-text access
e-Kitap -
5
International Joint Conference SOCO'17-CISIS'17-ICEUTE'17 León, Spain, September 6-8, 2017, Proceeding
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Kitap -
6
The Era of Internet of Things Towards a Smart World /
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Kitap -
7
Real-time Knowledge-based Fuzzy Logic Model for Soft Tissue Deformation
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Kitap -
8
Proceedings of International Conference on Artificial Intelligence and Applications : Icaia 2020.
Baskı/Yayın Bilgisi Springer Singapore Pte. Limited, 2020.İçindekiler: “…References -- Cryptosystem Based on Hybrid Chaotic Structured Phase Mask and Hybrid Mask Using Gyrator Transform -- 1 Introduction -- 2 Theoretical Background -- 2.1 Gyrator Transform -- 2.2 Hybrid Chaotic Structured Phase Mask -- 2.3 Hybrid Mask -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- PE File-Based Malware Detection Using Machine Learning -- 1 Introduction -- 1.1 Static Analysis -- 1.2 Dynamic Analysis -- 2 Related Work -- 3 Discussion -- 4 Conclusion -- References -- Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems -- 1 Logical Vulnerability, Threats and Risks in Cyber Security -- 2 Ontologies, Knowledge Graphs and Process Workflows -- 3 Ontology of Transactions Under Security Threats -- 3.1 Logical Foundations of the Ontological Modelling -- 3.2 Situations, Events, Threats and Items -- 3.3 Actions -- 3.4 Parametrization -- 4 Heuristic Level and Security Policies -- 4.1 Security Policies as Heuristics -- 4.2 Types of Heuristics -- 4.3 Examples of Heuristic Rules -- 5 Workflow Level and Intelligence Graphs -- 5.1 Transaction Flow as a Graph -- 5.2 Framework Validation -- 6 Process Level, Implementation and Future Work -- References -- Anomaly Detection Using Federated Learning -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Anomaly Detection -- 2.3 Deep Learning -- 2.4 Artificial Neutral Network -- 2.5 Autoencoder -- 3 Experiment -- 4 Result -- 5 Conclusion -- References -- Enhanced Digital Image Encryption Using Sine Transformed Complex Chaotic Sequence -- 1 Introduction -- 1.1 Chaotic Theory -- 2 Proposed Encryption Strategy -- 2.1 Surrounding Pixel Matrix Using SHA-256 -- 2.2 STLS -- 2.3 Image Matrix Permutation -- 2.4 Hybrid Rotation -- 2.5 Diffusion -- 3 Simulation Example -- 4 Results -- 4.1 Security Analysis of Secret Key.…”
Full-text access
e-Kitap -
9
Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.İçindekiler: “…WT Based Distributed Generation Location Minimizing Transmission Loss Using Mixed Integer Non-Linear Programming in Deregulated Electricity Market -- Chapter 49. …”
Full-text access
e-Kitap -
10
A New Coast Strategies for Responding to Devastating Storms and Rising Seas /
Baskı/Yayın Bilgisi Island Press/Center for Resource Economics : Imprint: Island Press, 2019.Full-text access
e-Kitap -
11
Disciplinary Convergence in Systems Engineering Research
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Kitap