Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "test"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/136481031X |
| Titel | Cyberspace Simulation and Evaluation : Third International Conference, CSE 2024, Shenzhen, China, November 26–28, 2024, Proceedings, Part II / edited by Guangxia Xu, Wanlei Zhou, Jiawei Zhang, Yanchun Zhang, Yan Jia |
| Person(en) |
Xu, Guangxia (Herausgeber) Zhou, Wanlei (Herausgeber) Zhang, Jiawei (Herausgeber) Zhang, Yanchun (Herausgeber) Jia, Yan (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2025 |
| Verlag | Singapore : Springer Nature Singapore, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2025 |
| Umfang/Format | Online-Ressource, XIII, 490 p. 147 illus., 112 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-981-9645-05-3 Printed edition:: ISBN: 978-981-9645-07-7 |
| Inhalt | -- Attack Methodology in the Evaluation . -- Directed Symbolic Execution Tool Based on Clang Static Analyzer: Efficient and Accurate Verification of Static Analysis Results. -- A Survey on Covert Network Attack. -- Review of Path Planning and Decision-Making in Automated Penetration Testing. -- Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph. -- A Self-evolution Attack Tree Method Based on the MDATA Model for Attack Tactics Recommendation. -- WFSCK: An Intelligent File System Check Recovery and Task Management Framework. -- Power Analysis Attack Based on Chosen-plaintext. -- Modeling and Assessing The Attack Behaviour of Weak Passwords Based on Attack Graph. -- Other Simulation and Evaluation methods. -- A Multispectral Pedestrian Detection Method Based on Feature Fusion. -- Localization of small targets in smart grain warehouse based on VAE-LSTM. -- Hybrid Indexing for Label-Constrained Reachability on Temporal Property Graphs. -- Reverse Method for DGA Based on Generative BiLSTM Model. -- Enhancing Cross-Domain Data Analytics through MultiSource Transfer Learning. -- A novel image encryption algorithm based on chaotic tent mapping. -- A Comparative Testing of Object Detection Model based on Adversarial Examples. -- Exploring Occupational Gender Bias in Large Language Models of High-Resource Language. -- FEDGA:FL with Dynamic Gradient and Group Normalization. -- Evaluation Theory and Methodology. -- Review of Fuzz Testing Techniques for Database Management Systems. -- Correlation Analysis of Tor Traffic Based on RAINBOW Scheme in Cloud Computing Environment. -- A hybrid framework for effective and efficient machine unlearning. -- Enhancing Mixnets Security: Detecting and Isolating Malicious Nodes While Forcing Adversaries into Strategic Trade-offs. -- Adaptive Web Crawling for Threat Intelligence Using a Reinforcement Learning-Enhanced Large Language Model. -- Enhancing Continuous Cognitive Diagnosis with Fuzzy Strategy-Based Hybrid Genetic Algorithm. -- An Attention-Based Fuzzy Logic Method for Enhancing Node Aggregations in Graph Neural Network. -- Defense Methodology in the Evaluation I. -- Privacy-preserving recommendation algorithm based on Federated Learning. -- YOLOv8-MING: Research on privacy fall detection algorithm based on improved YOLOv8. -- NetTrans: Robust Encrypted Network Traffic Analysis with Multi-modal Pre-training. -- Language Game for Evading Privacy Disclosure Risks via LLM-based Multi-agent Simulation. -- A Password Generation Scheme Excluding Personal Privacy Information |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2505070408159.299158886774 DOI: 10.1007/978-981-96-4506-0 |
| URL | https://doi.org/10.1007/978-981-96-4506-0 |
| ISBN/Einband/Preis | 978-981-96-4506-0 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Communications in Computer and Information Science ; 2421 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

