Arama Sonuçları - Intelligence and Security Committee

  • Gösterilen 1 - 20 sonuçlar arası kayıtlar. 20
Sonuçları Daraltın
  1. 1

    Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 /

    Baskı/Yayın Bilgisi 2017
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  2. 2
  3. 3

    Innovations in Computer Science and Engineering Proceedings of the Fifth ICICSE 2017 /

    Baskı/Yayın Bilgisi 2019
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  4. 4
  5. 5

    Proceedings of International Conference on Artificial Intelligence and Applications : Icaia 2020. Yazar: Bansal, Poonam

    Baskı/Yayın Bilgisi 2020
    İçindekiler: “…References -- Cryptosystem Based on Hybrid Chaotic Structured Phase Mask and Hybrid Mask Using Gyrator Transform -- 1 Introduction -- 2 Theoretical Background -- 2.1 Gyrator Transform -- 2.2 Hybrid Chaotic Structured Phase Mask -- 2.3 Hybrid Mask -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- PE File-Based Malware Detection Using Machine Learning -- 1 Introduction -- 1.1 Static Analysis -- 1.2 Dynamic Analysis -- 2 Related Work -- 3 Discussion -- 4 Conclusion -- References -- Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems -- 1 Logical Vulnerability, Threats and Risks in Cyber Security -- 2 Ontologies, Knowledge Graphs and Process Workflows -- 3 Ontology of Transactions Under Security Threats -- 3.1 Logical Foundations of the Ontological Modelling -- 3.2 Situations, Events, Threats and Items -- 3.3 Actions -- 3.4 Parametrization -- 4 Heuristic Level and Security Policies -- 4.1 Security Policies as Heuristics -- 4.2 Types of Heuristics -- 4.3 Examples of Heuristic Rules -- 5 Workflow Level and Intelligence Graphs -- 5.1 Transaction Flow as a Graph -- 5.2 Framework Validation -- 6 Process Level, Implementation and Future Work -- References -- Anomaly Detection Using Federated Learning -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Anomaly Detection -- 2.3 Deep Learning -- 2.4 Artificial Neutral Network -- 2.5 Autoencoder -- 3 Experiment -- 4 Result -- 5 Conclusion -- References -- Enhanced Digital Image Encryption Using Sine Transformed Complex Chaotic Sequence -- 1 Introduction -- 1.1 Chaotic Theory -- 2 Proposed Encryption Strategy -- 2.1 Surrounding Pixel Matrix Using SHA-256 -- 2.2 STLS -- 2.3 Image Matrix Permutation -- 2.4 Hybrid Rotation -- 2.5 Diffusion -- 3 Simulation Example -- 4 Results -- 4.1 Security Analysis of Secret Key.…”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation VI

    Baskı/Yayın Bilgisi 2018
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  12. 12
  13. 13
  14. 14

    Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 2 /

    Baskı/Yayın Bilgisi 2018
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  15. 15

    Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 1 /

    Baskı/Yayın Bilgisi 2017
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  16. 16
  17. 17
  18. 18
  19. 19

    Proceedings of International Conference on Cognition and Recognition ICCR 2016 /

    Baskı/Yayın Bilgisi 2018
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  20. 20