CASIA OpenIR

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Intelligence and Security Informatics 专著章节/文集论文
出自: Lecture Notes in Computer Science, No. 5075, GER, GER, GER, GER:Springer, Springer, Springer, Springer, 2008
Authors:  Yang, C.;  Chen, H.;  Chau, M.;  Chang, K.;  Lang, S.-D.;  Chen, P.;  Hsieh, R.;  Zeng, D.;  F. Y. Wang;  Carley, K.;  Mao, W.;  Zhan, J.
Favorite  |  View/Download:33/0  |  Submit date:2017/07/16
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:33/0  |  Submit date:2015/11/06
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:39/0  |  Submit date:2015/11/06
Homeland Security  Intelligence  Information  
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:52/0  |  Submit date:2015/11/06
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:40/0  |  Submit date:2015/11/07
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  Favorite  |  View/Download:38/6  |  Submit date:2015/11/07
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
Authors:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
View  |  Adobe PDF(109Kb)  |  Favorite  |  View/Download:68/22  |  Submit date:2015/11/08
Novel Identity Authentication  
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
Authors:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  Favorite  |  View/Download:38/5  |  Submit date:2015/11/07