×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [13]
上海电子信息职业技... [10]
清华大学 [9]
西安交通大学 [7]
软件研究所 [6]
北京航空航天大学 [4]
更多...
内容类型
会议论文 [75]
发表日期
2020 [2]
2019 [4]
2018 [5]
2017 [5]
2016 [5]
2015 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共75条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An Interactive Approach of Rule Mining and Anomaly Detection for Internal Risks
会议论文
6th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2020, Istanbul, Turkey (Online), 2020-7-16~2020-7-17
作者:
Liu, Kun
;
Wu, Yunkun
;
Wei, Wenting
;
Wang, Zhonghui
;
Zhu, Jiaqi
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/01/05
Internal risks
Behavior rule mining
Anomaly detection
Complex events
A novel navigation method for autonomous underwater vehicle in the middle water column∗
会议论文
Biloxi, MS, United states, October 5-30, 2020
作者:
Feng H(冯浩)
;
Yu JC(俞建成)
;
Huang Y(黄琰)
;
Qiao JN(乔佳楠)
;
Wang ZY(王振宇)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/05/10
Autonomous underwater vehicle
navigation
ADCP
DVL
current estimation
An Event Based Detection of Internal Threat to Information System
会议论文
5th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2019, Kunming, China, 2019-7-20 ~ 2019-7-22
作者:
Li, Zheng
;
Liu, Kun
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2021/01/05
Internal threat
Event detection
Rule engine
Complex event
Workflow Model Mining Based On Educational Management Data Logs
会议论文
31st Chinese Control and Decision Conference, CCDC 2019, Nanchang, China, 2019-06-03
作者:
Cheng, Naike
;
Wang, Lei
;
Fei, Rong
;
Li, Wei
;
Wang, Bin
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/20
Compensating elastic transmission losses for P-wave attenuation estimation from sonic logs
会议论文
GEOPHYSICAL PROSPECTING, 2019-05-01
-
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/01/03
Q estimation
Acoustic logs
Statistical averaging
Elastic transmission losses
Auditing Between Event Logs and Process Trees
会议论文
15th International Forum on Digital TV and Multimedia Communication (IFTC), SEP 20-21, 2018
作者:
Li, Hongxia
;
Hou, Haixia
;
Du, Yuyue
;
Liu, Zhi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
Auditing
Process mining
Process tree
Petri nets
High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application
会议论文
作者:
Meng, Yongwei
;
Qin, Tao
;
Liu, Yukun
;
He, Chao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/19
Frequent pattern mining
Intrusion prevention systems
IPS logs
Network security management
Potential threats
Security management
threat ranking
Xi'an Jiaotong University
Behavior rhythm: An effective model for massive logs characterizing and security monitoring in cloud
会议论文
作者:
Qin, Tao
;
He, Chao
;
Jiang, Hezhi
;
Chen, Ruoya
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/19
Abnormal behavior
Behavior characteristic
Cloud securities
Cloud security managements
Command sequences
Concept of operations
Security monitoring
Xian Jiaotong University
Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in Cloud
会议论文
作者:
Qin, Tao
;
He, Chao
;
Jiang, Hezhi
;
Chen, Ruoya
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/26
Big-Data Analysis of Multi-Source Logs for Network Anomaly Detection
会议论文
作者:
He, Wang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
©版权所有 ©2017 CSpace - Powered by
CSpace