CORC

浏览/检索结果: 共75条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
An Interactive Approach of Rule Mining and Anomaly Detection for Internal Risks 会议论文
6th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2020, Istanbul, Turkey (Online), 2020-7-16~2020-7-17
作者:  Liu, Kun;  Wu, Yunkun;  Wei, Wenting;  Wang, Zhonghui;  Zhu, Jiaqi
收藏  |  浏览/下载:14/0  |  提交时间:2021/01/05
A novel navigation method for autonomous underwater vehicle in the middle water column∗ 会议论文
Biloxi, MS, United states, October 5-30, 2020
作者:  Feng H(冯浩);  Yu JC(俞建成);  Huang Y(黄琰);  Qiao JN(乔佳楠);  Wang ZY(王振宇)
收藏  |  浏览/下载:22/0  |  提交时间:2021/05/10
An Event Based Detection of Internal Threat to Information System 会议论文
5th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2019, Kunming, China, 2019-7-20 ~ 2019-7-22
作者:  Li, Zheng;  Liu, Kun
收藏  |  浏览/下载:2/0  |  提交时间:2021/01/05
Workflow Model Mining Based On Educational Management Data Logs 会议论文
31st Chinese Control and Decision Conference, CCDC 2019, Nanchang, China, 2019-06-03
作者:  Cheng, Naike;  Wang, Lei;  Fei, Rong;  Li, Wei;  Wang, Bin
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/20
Compensating elastic transmission losses for P-wave attenuation estimation from sonic logs 会议论文
GEOPHYSICAL PROSPECTING, 2019-05-01
-
收藏  |  浏览/下载:10/0  |  提交时间:2020/01/03
Auditing Between Event Logs and Process Trees 会议论文
15th International Forum on Digital TV and Multimedia Communication (IFTC), SEP 20-21, 2018
作者:  Li, Hongxia;  Hou, Haixia;  Du, Yuyue;  Liu, Zhi
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application 会议论文
作者:  Meng, Yongwei;  Qin, Tao;  Liu, Yukun;  He, Chao
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/19
Behavior rhythm: An effective model for massive logs characterizing and security monitoring in cloud 会议论文
作者:  Qin, Tao;  He, Chao;  Jiang, Hezhi;  Chen, Ruoya
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/19
Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in Cloud 会议论文
作者:  Qin, Tao;  He, Chao;  Jiang, Hezhi;  Chen, Ruoya
收藏  |  浏览/下载:2/0  |  提交时间:2019/11/26
Big-Data Analysis of Multi-Source Logs for Network Anomaly Detection 会议论文
作者:  He, Wang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace