Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cyber Algorithm“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cyber Algorithm" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cyber Algorithm"
Manas Kumar Yogi and Dwarampudi Aiswarya. "Designing Greedy Algorithm for Cyber Threat Detection." Journal of ISMAC 5, no. 3 (2023): 200–218. http://dx.doi.org/10.36548/jismac.2023.3.002.
Der volle Inhalt der QuelleYin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.
Der volle Inhalt der QuelleRahman, S. R. "A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 2 (2022): 79–85. http://dx.doi.org/10.17762/ijfrcsce.v8i2.2081.
Der volle Inhalt der QuelleZaki Abdullah, Mahmood, Ali Kalid Jassim, Fadia Noori Hummadi, and Mohammed Majid M. Al Khalidy. "NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS." Journal of Engineering and Sustainable Development 28, no. 3 (2024): 342–54. http://dx.doi.org/10.31272/jeasd.28.3.4.
Der volle Inhalt der QuelleKACHYNSKYI, A., D. VARYCHEVA, and S. SVYRYDENKO. "Quantitative assessments of cyber security system priorities." INFORMATION AND LAW, no. 2(17) (June 29, 2016): 114–26. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272912.
Der volle Inhalt der QuelleSon, Vu Ngoc. "Optimizing Network Anomaly Detection Based on Network Traffic." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 53–60. http://dx.doi.org/10.46338/ijetae1121_07.
Der volle Inhalt der QuelleAmin, Reham, Ghada El-Taweel, Ahmed Fouad Ali, and Mohamed Tahoun. "A Hybrid Extreme Gradient Boosting and Long Short-Term Memory Algorithm for Cyber Threats Detection." MENDEL 29, no. 2 (2023): 307–22. http://dx.doi.org/10.13164/mendel.2023.2.307.
Der volle Inhalt der QuelleJin, Zengwang, Menglu Ma, Shuting Zhang, Yanyan Hu, Yanning Zhang, and Changyin Sun. "Secure State Estimation of Cyber-Physical System under Cyber Attacks: Q-Learning vs. SARSA." Electronics 11, no. 19 (2022): 3161. http://dx.doi.org/10.3390/electronics11193161.
Der volle Inhalt der QuelleKorystin, Оleksandr, Svyrydiuk Nataliia, and Olena Mitina. "Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm." International Journal of Computer Network and Information Security 14, no. 4 (2022): 1–13. http://dx.doi.org/10.5815/ijcnis.2022.04.01.
Der volle Inhalt der QuelleLiu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.
Der volle Inhalt der QuelleDissertationen zum Thema "Cyber Algorithm"
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Der volle Inhalt der QuelleChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Der volle Inhalt der QuelleRoychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.
Der volle Inhalt der QuelleGuymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.
Der volle Inhalt der QuelleGujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.
Der volle Inhalt der QuelleFurrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.
Der volle Inhalt der QuelleKem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.
Der volle Inhalt der QuelleStaub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.
Der volle Inhalt der QuelleMarkwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Der volle Inhalt der QuelleRukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.
Der volle Inhalt der QuelleBücher zum Thema "Cyber Algorithm"
Dusadeerungsikul, Puwadol Oak, and Shimon Y. Nof. Cyber-Collaborative Algorithms and Protocols. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-56196-2.
Der volle Inhalt der QuelleKravets, Alla G., Alexander A. Bolshakov, and Maxim Shcherbakov, eds. Cyber-Physical Systems: Intelligent Models and Algorithms. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95116-0.
Der volle Inhalt der QuellePrandini, Maria, and Ricardo G. Sanfelice, eds. Computation-Aware Algorithmic Design for Cyber-Physical Systems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-43448-8.
Der volle Inhalt der QuelleCvetkov, Viktor. Basics of complexity theory. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110856.
Der volle Inhalt der QuelleGupta, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.
Den vollen Inhalt der Quelle findenComputer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.
Den vollen Inhalt der Quelle findenGupta, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.
Den vollen Inhalt der Quelle findenGupta, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Auerbach Publishers, Incorporated, 2018.
Den vollen Inhalt der Quelle findenAnalog - A Cyber-Dystopian Noir Vol. 1: Death by Algorithm. Image Comics, 2018.
Den vollen Inhalt der Quelle findenAvomo, Javier Clemente Engonga. Greed,decoding Amazon's Trading Algorithm: Cyber Revolution HOW to HACK AMAZON 2. Independently Published, 2021.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cyber Algorithm"
Zhao, Xiaodong, Mengying Cao, Jingfang Su, Yijin Zhao, Shuying Liu, and Pingping Yu. "Path Planning Algorithm Based on A_star Algorithm and Q-Learning Algorithm." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8_12.
Der volle Inhalt der QuelleWang, Yuanjie. "Macroeconomic Forecast Based on Neural Network Algorithm and Genetic Algorithm." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_13.
Der volle Inhalt der QuelleZhou, Lu, and Yu Cui. "Electrical Control System Based on Machine Algorithm and Adaptive Fuzzy Algorithm." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_122.
Der volle Inhalt der QuelleChen, Yikuan, Liang Li, and Wei Gao. "Domination Based Federated Learning Algorithm." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8_51.
Der volle Inhalt der QuelleHong, Sung-Soo, and Sang-Kil Kim. "Mobile Animation Algorithm for Cyber Museum." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44864-0_61.
Der volle Inhalt der QuelleNguyen, Viet T., Alla G. Kravets, and Tu Q. H. Duong. "Predicting Research Trend Based on Bibliometric Analysis and Paper Ranking Algorithm." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_10.
Der volle Inhalt der QuelleZhao, Ziyu, and Jintai Ding. "Practical Improvements on BKZ Algorithm." In Cyber Security, Cryptology, and Machine Learning. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_19.
Der volle Inhalt der QuellePolyakov, Vladimir, Dmitriy Buhanov, Maxim Panchenko, Margarita Redkina, and Sergey Chernikov. "Research of the ELA Algorithm for Identifying Editing Fact in Jpeg Images." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_21.
Der volle Inhalt der QuelleChen, Yun, Yunlan Du, and Xiaomei Cao. "Density Peak Clustering Algorithm Based on Differential Privacy Preserving." In Science of Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34637-9_2.
Der volle Inhalt der QuelleWang, Caixin, Lili Wang, and Hongyong Yang. "Improved Kmeans Algorithm Based on Privacy Protection." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_42.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cyber Algorithm"
Wang, Minghao, and Shaoyi Du. "OCDE: Adaptive Differential Evolution Algorithm in Distributed Intelligent Systems." In 2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2024. https://doi.org/10.1109/cyberc62439.2024.00013.
Der volle Inhalt der QuelleFisher, Ashwin, Rusty Baldwin, James T. Graham, and Ronald Riley. "Block-level algorithm classification based on RF side-channel." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2303847.
Der volle Inhalt der QuelleChang, Jian, Bin Li, Guowei Zhang, Zhida Liang, and Cong Wang. "The Control Algorithm of 7 DOF Manipulator Based on Hybrid Force and Position Algorithm." In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446183.
Der volle Inhalt der QuelleMohialden, Yasmin Makki, Saba Abdulbaqi Salman, Nadia Mahmood Hussien, and Younus Abdul Kareem Mohammed. "Multi-algorithm approach for arabic CAPTCHA generation." In CYBER DEFENSE IRAQ: CDI2024. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0234034.
Der volle Inhalt der QuelleRiley, Ronald A., James T. Graham, Ashwin Fisher, Rusty O. Baldwin, and Ryan M. Fuller. "Generalization of algorithm recognition in RF side channels between devices." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2304468.
Der volle Inhalt der QuelleBelaidi, Abderrahmane, and Hadjira Belaidi. "Optimization algorithm of manipulator robot performances." In 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2014. http://dx.doi.org/10.1109/cyber.2014.6917459.
Der volle Inhalt der QuelleDong, Huailin, Mingyuan He, and Ming Qiu. "Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm." In 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2015. http://dx.doi.org/10.1109/cyberc.2015.15.
Der volle Inhalt der QuelleZexi, Deng, and Huang Feidan. "Cuckoo search algorithm for solving numerical integration." In 2015 IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2015. http://dx.doi.org/10.1109/cyber.2015.7288168.
Der volle Inhalt der QuelleLiwei, Wang, and Yin Ming. "A novel quadratic optimization control MPPT algorithm." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6319986.
Der volle Inhalt der QuelleShuang, Yuan, and Lv Ci-xing. "Fast adaboost algorithm based on weight constraints." In 2015 IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2015. http://dx.doi.org/10.1109/cyber.2015.7288050.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Cyber Algorithm"
Guo, Ge, Jiageng Liu, and Guangheng Liu. Multi-sensor Fusion-based Vehicle Localization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024023.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Der volle Inhalt der QuelleIn Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/infographic.000003.
Der volle Inhalt der Quelle