Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cyber Algorithm“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cyber Algorithm" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cyber Algorithm"
Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.
Der volle Inhalt der QuelleLiu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.
Der volle Inhalt der QuelleChoi, Young Hwan, Ali Sadollah, and Joong Hoon Kim. "Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning Machine." Applied Sciences 10, no. 22 (2020): 8179. http://dx.doi.org/10.3390/app10228179.
Der volle Inhalt der QuelleYang, Tingting, Hailong Feng, Jian Zhao, Ruilong Deng, Ying Wang, and Zhou Su. "Genetic optimization–based scheduling in maritime cyber physical systems." International Journal of Distributed Sensor Networks 13, no. 7 (2017): 155014771771716. http://dx.doi.org/10.1177/1550147717717163.
Der volle Inhalt der QuelleN, Valliammal, and Barani Shaju. "Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey." International Journal of Advanced Technology and Engineering Exploration 5, no. 49 (2018): 489–94. http://dx.doi.org/10.19101/ijatee.2018.547030.
Der volle Inhalt der QuelleP, Karunakaran. "Deep Learning Approach to DGA Classification for Effective Cyber Security." December 2020 2, no. 4 (2021): 203–13. http://dx.doi.org/10.36548/jucct.2020.4.003.
Der volle Inhalt der QuelleYin, Peng-Yeng, Po-Yen Chen, Ying-Chieh Wei, and Rong-Fuh Day. "Cyber Firefly Algorithm Based on Adaptive Memory Programming for Global Optimization." Applied Sciences 10, no. 24 (2020): 8961. http://dx.doi.org/10.3390/app10248961.
Der volle Inhalt der QuelleKozik, Rafał, and Michał Choraś. "Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6047053.
Der volle Inhalt der QuelleDo, ChoXuan, Nguyen Quang Dam, and Nguyen Tung Lam. "Optimization of network traffic anomaly detection using machine learning." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2360. http://dx.doi.org/10.11591/ijece.v11i3.pp2360-2370.
Der volle Inhalt der QuelleMa, Wu Bin, Ming Xing Liu, Su Deng, and Hong Bin Huang. "A Spatial Resource Top-K Query Algorithm in Cyber Physical System." Advanced Materials Research 774-776 (September 2013): 1725–28. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1725.
Der volle Inhalt der QuelleDissertationen zum Thema "Cyber Algorithm"
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Der volle Inhalt der QuelleChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Der volle Inhalt der QuelleRoychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.
Der volle Inhalt der QuelleGuymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.
Der volle Inhalt der QuelleGujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.
Der volle Inhalt der QuelleFurrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.
Der volle Inhalt der QuelleKem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.
Der volle Inhalt der QuelleStaub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.
Der volle Inhalt der QuelleMarkwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Der volle Inhalt der QuelleRukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.
Der volle Inhalt der QuelleBücher zum Thema "Cyber Algorithm"
Analog - A Cyber-Dystopian Noir Vol. 1: Death by Algorithm. Image Comics, 2018.
Den vollen Inhalt der Quelle findenSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cyber Algorithm"
Hong, Sung-Soo, and Sang-Kil Kim. "Mobile Animation Algorithm for Cyber Museum." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44864-0_61.
Der volle Inhalt der QuelleNguyen, Viet T., Alla G. Kravets, and Tu Q. H. Duong. "Predicting Research Trend Based on Bibliometric Analysis and Paper Ranking Algorithm." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_10.
Der volle Inhalt der QuellePolyakov, Vladimir, Dmitriy Buhanov, Maxim Panchenko, Margarita Redkina, and Sergey Chernikov. "Research of the ELA Algorithm for Identifying Editing Fact in Jpeg Images." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_21.
Der volle Inhalt der QuelleChen, Yun, Yunlan Du, and Xiaomei Cao. "Density Peak Clustering Algorithm Based on Differential Privacy Preserving." In Science of Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34637-9_2.
Der volle Inhalt der QuelleBaruch, Moran, and Gil David. "Domain Generation Algorithm Detection Using Machine Learning Methods." In Cyber Security: Power and Technology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_9.
Der volle Inhalt der QuelleWang, Jing, Fuqi Song, Aihua Yin, and Hui Chen. "Firefly Algorithm Based on Dynamic Step Change Strategy." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6_31.
Der volle Inhalt der QuelleCheng, Xianfu, Yanqing Yao, and Ao Liu. "An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_29.
Der volle Inhalt der QuelleAlsuwat, Emad, Hatim Alsuwat, Marco Valtorta, and Csilla Farkas. "Cyber Attacks Against the PC Learning Algorithm." In ECML PKDD 2018 Workshops. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13453-2_13.
Der volle Inhalt der QuellePeng, Jiao, and Shu Gong. "Optimization of Collaborative Filtering Algorithm in Movie Recommendation System." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7_2.
Der volle Inhalt der QuelleLiu, Bo, Jianhou Gan, Jun Wang, and Bin Wen. "Product Consistency Joint Detection Algorithm Based on Deep Learning." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7_28.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cyber Algorithm"
Fisher, Ashwin, Rusty Baldwin, James T. Graham, and Ronald Riley. "Block-level algorithm classification based on RF side-channel." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2303847.
Der volle Inhalt der QuelleRiley, Ronald A., James T. Graham, Ashwin Fisher, Rusty O. Baldwin, and Ryan M. Fuller. "Generalization of algorithm recognition in RF side channels between devices." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2304468.
Der volle Inhalt der QuelleDong, Huailin, Mingyuan He, and Ming Qiu. "Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm." In 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2015. http://dx.doi.org/10.1109/cyberc.2015.15.
Der volle Inhalt der QuelleChang, Jian, Bin Li, Guowei Zhang, Zhida Liang, and Cong Wang. "The Control Algorithm of 7 DOF Manipulator Based on Hybrid Force and Position Algorithm." In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446183.
Der volle Inhalt der QuelleChen, Min, XueDong Gao, and HuiFei Li. "An efficient parallel FP-Growth algorithm." In 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2009. http://dx.doi.org/10.1109/cyberc.2009.5342148.
Der volle Inhalt der QuelleSun, Zhixin, Yadang Chen, and Zhixin Sun. "An Algorithm Based on Directed Graph." In 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2010. http://dx.doi.org/10.1109/cyberc.2010.63.
Der volle Inhalt der QuelleO'Brien, Neil S., Steven J. Johnston, Elizabeth E. Hart, Kamal Djidjeli, and Simon J. Cox. "Exploiting Cloud Computing for Algorithm Development." In 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2011. http://dx.doi.org/10.1109/cyberc.2011.60.
Der volle Inhalt der QuelleChen, Liang, Zhang Tong, Wen Liu, and Chengmin Gao. "Non-interactive Exponential Homomorphic Encryption Algorithm." In 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2012. http://dx.doi.org/10.1109/cyberc.2012.44.
Der volle Inhalt der QuelleJones, Keith J., and Yong Wang. "An Optimized Running Window Entropy Algorithm." In 2018 National Cyber Summit (NCS). IEEE, 2018. http://dx.doi.org/10.1109/ncs.2018.00016.
Der volle Inhalt der QuelleBelaidi, Abderrahmane, and Hadjira Belaidi. "Optimization algorithm of manipulator robot performances." In 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2014. http://dx.doi.org/10.1109/cyber.2014.6917459.
Der volle Inhalt der Quelle