Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: "test"



Treffer 550 von 110479 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/136481031X
Titel Cyberspace Simulation and Evaluation : Third International Conference, CSE 2024, Shenzhen, China, November 26–28, 2024, Proceedings, Part II / edited by Guangxia Xu, Wanlei Zhou, Jiawei Zhang, Yanchun Zhang, Yan Jia
Person(en) Xu, Guangxia (Herausgeber)
Zhou, Wanlei (Herausgeber)
Zhang, Jiawei (Herausgeber)
Zhang, Yanchun (Herausgeber)
Jia, Yan (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2025
Verlag Singapore : Springer Nature Singapore, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2025
Umfang/Format Online-Ressource, XIII, 490 p. 147 illus., 112 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-981-9645-05-3
Printed edition:: ISBN: 978-981-9645-07-7
Inhalt -- Attack Methodology in the Evaluation . -- Directed Symbolic Execution Tool Based on Clang Static Analyzer: Efficient and Accurate Verification of Static Analysis Results. -- A Survey on Covert Network Attack. -- Review of Path Planning and Decision-Making in Automated Penetration Testing. -- Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph. -- A Self-evolution Attack Tree Method Based on the MDATA Model for Attack Tactics Recommendation. -- WFSCK: An Intelligent File System Check Recovery and Task Management Framework. -- Power Analysis Attack Based on Chosen-plaintext. -- Modeling and Assessing The Attack Behaviour of Weak Passwords Based on Attack Graph. -- Other Simulation and Evaluation methods. -- A Multispectral Pedestrian Detection Method Based on Feature Fusion. -- Localization of small targets in smart grain warehouse based on VAE-LSTM. -- Hybrid Indexing for Label-Constrained Reachability on Temporal Property Graphs. -- Reverse Method for DGA Based on Generative BiLSTM Model. -- Enhancing Cross-Domain Data Analytics through MultiSource Transfer Learning. -- A novel image encryption algorithm based on chaotic tent mapping. -- A Comparative Testing of Object Detection Model based on Adversarial Examples. -- Exploring Occupational Gender Bias in Large Language Models of High-Resource Language. -- FEDGA:FL with Dynamic Gradient and Group Normalization. -- Evaluation Theory and Methodology. -- Review of Fuzz Testing Techniques for Database Management Systems. -- Correlation Analysis of Tor Traffic Based on RAINBOW Scheme in Cloud Computing Environment. -- A hybrid framework for effective and efficient machine unlearning. -- Enhancing Mixnets Security: Detecting and Isolating Malicious Nodes While Forcing Adversaries into Strategic Trade-offs. -- Adaptive Web Crawling for Threat Intelligence Using a Reinforcement Learning-Enhanced Large Language Model. -- Enhancing Continuous Cognitive Diagnosis with Fuzzy Strategy-Based Hybrid Genetic Algorithm. -- An Attention-Based Fuzzy Logic Method for Enhancing Node Aggregations in Graph Neural Network. -- Defense Methodology in the Evaluation I. -- Privacy-preserving recommendation algorithm based on Federated Learning. -- YOLOv8-MING: Research on privacy fall detection algorithm based on improved YOLOv8. -- NetTrans: Robust Encrypted Network Traffic Analysis with Multi-modal Pre-training. -- Language Game for Evading Privacy Disclosure Risks via LLM-based Multi-agent Simulation. -- A Password Generation Scheme Excluding Personal Privacy Information
Persistent Identifier URN: urn:nbn:de:101:1-2505070408159.299158886774
DOI: 10.1007/978-981-96-4506-0
URL https://doi.org/10.1007/978-981-96-4506-0
ISBN/Einband/Preis 978-981-96-4506-0
Sprache(n) Englisch (eng)
Beziehungen Communications in Computer and Information Science ; 2421
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 550 von 110479
< < > <


E-Mail-IconAdministration