Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The use of computational intelligence in intrusion detection systems: A review
SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
[PDF][PDF] A survey about fuzzy cognitive maps papers
J Aguilar - International journal of computational cognition, 2005 - researchgate.net
In this paper we present different results and studies around the world about the Fuzzy
Cognitive Maps. This technique is the fusion of the advances of the fuzzy logic and cognitive …
Cognitive Maps. This technique is the fusion of the advances of the fuzzy logic and cognitive …
Effective intrusion detection using multiple sensors in wireless ad hoc networks
O Kachirski, R Guha - 36th Annual Hawaii International …, 2003 - ieeexplore.ieee.org
In this paper we propose a distributed intrusion detection system for ad hoc wireless
networks based on mobile agent technology. Wireless networks are particularly vulnerable …
networks based on mobile agent technology. Wireless networks are particularly vulnerable …
Intrusion detection using mobile agents in wireless ad hoc networks
O Kachirski, R Guha - Proceedings. IEEE Workshop on …, 2002 - ieeexplore.ieee.org
In this paper we propose a distributed intrusion detection system for ad hoc wireless
networks based on mobile agent technology. Wireless networks are particularly vulnerable …
networks based on mobile agent technology. Wireless networks are particularly vulnerable …
A graph based approach toward network forensics analysis
W Wang, TE Daniels - ACM Transactions on Information and System …, 2008 - dl.acm.org
In this article we develop a novel graph-based approach toward network forensics analysis.
Central to our approach is the evidence graph model that facilitates evidence presentation …
Central to our approach is the evidence graph model that facilitates evidence presentation …
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
This paper describes the design and implementation of a two-stage intrusion detection
system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is …
system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is …
Analyzing risk impact factors using extended fuzzy cognitive maps
One of the challenges in Risk Analysis and Management (RAM) is identifying the
relationships between risk factors and risks. The complexity of the method to analyze these …
relationships between risk factors and risks. The complexity of the method to analyze these …
[LIBRO][B] Security in RFID and sensor networks
P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …
Learning of fuzzy cognitive maps using density estimate
Fuzzy cognitive maps (FCMs) are convenient and widely used architectures for modeling
dynamic systems, which are characterized by a great deal of flexibility and adaptability …
dynamic systems, which are characterized by a great deal of flexibility and adaptability …
Cyber-security challenges with smes in develo** economies: Issues of confidentiality, integrity & availability (CIA)
EO Yeboah-Boateng - 2013 - vbn.aau.dk
The essence of this study is first to highlight the cyber-security challenges confronting SMEs
in develo** economies, and to model a framework for safeguarding their assets, to ensure …
in develo** economies, and to model a framework for safeguarding their assets, to ensure …