CASIA OpenIR

浏览/检索结果: 共9条,第1-9条 帮助

已选(0)清除 条数/页:   排序方式:
Intelligence and Security Informatics 专著章节/文集论文
出自: LNCS, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2011
作者:  Michael Chau;  Alan G. Wang;  Xiaolong Zheng;  Hsinchun Chen;  Daniel Zeng;  Wenji Mao
image/png(73Kb)  |  收藏  |  浏览/下载:235/56  |  提交时间:2018/03/09
Intelligence and Security Informatics 专著章节/文集论文
出自: Lecture Notes in Computer Science, No. 5075, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2008
作者:  Yang, C.;  Chen, H.;  Chau, M.;  Chang, K.;  Lang, S.-D.;  Chen, P.;  Hsieh, R.;  Zeng, D.;  F. Y. Wang;  Carley, K.;  Mao, W.;  Zhan, J.
收藏  |  浏览/下载:236/0  |  提交时间:2017/07/16
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
浏览  |  Adobe PDF(109Kb)  |  收藏  |  浏览/下载:392/132  |  提交时间:2015/11/08
Novel Identity Authentication  
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
作者:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  收藏  |  浏览/下载:238/60  |  提交时间:2015/11/07
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
作者:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:227/0  |  提交时间:2015/11/07
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
作者:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  收藏  |  浏览/下载:320/69  |  提交时间:2015/11/07
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
作者:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:195/0  |  提交时间:2015/11/06
Homeland Security  Intelligence  Information  
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
作者:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:195/0  |  提交时间:2015/11/06
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
作者:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:297/0  |  提交时间:2015/11/06