CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Distinguishing Neural Speech Synthesis Models Through Fingerprints in Speech Waveforms 会议论文
Taiyuan, Shanxi, China, 2024-07-27
作者:  Zhang, Chu Yuan;  Yi, Jiangyan;  Tao, Jianhua;  Wang, Chenglong;  Yan, Xinrui
收藏  |  浏览/下载:5/0  |  提交时间:2024/06/26
A Questionnaire and Big Data-based Study on the Mixing up of Chinese Structural Particles 会议论文
Conference: 2nd International Conference on Education, Knowledge and Information Management, ICEKIM 2021, 不详, January 29, 2021 - January 31, 2021
作者:  Gao, Yu;  Wang, Jing;  Buxin, Han
收藏  |  浏览/下载:12/0  |  提交时间:2021/08/16
Sequence Alignment-Based Detection Method for Resource Misuse in Information Systems 会议论文
6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013-11-23
作者:  Zhang, Gaoyu[1];  He, Xiaoxia[2];  Zhou, Zhizhao[3];  Wang, Chao[4]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/30
Design and Implementation of Lightweight Wireless Lan Intrusion Detection System 会议论文
4th International Conference on Multimedia Information Networking and Security (MINES), NOV 02-04, 2012
作者:  Wu Jian;  Fang Zhi-feng;  Cao Yong
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/31
Dynamic identifying and tracking framework for cutters using RFID technology in digital workshop 会议论文
作者:  Zhou, Guanghui;  Xiao, Zhongdong;  Wang, Ben;  Jiang, Pingyu
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/10
Intrusion detection system combining misuse detection and anomaly detection using genetic network programming 会议论文
ICCAS-SICE 2009 - ICROS-SICE International Joint Conference 2009, 2009-08-18
作者:  Gong, Yunlu[1];  Mabu, Shingo[2];  Chen, Ci[3];  Wang, Yifei[4];  Hirasawa, Kotaro[5]
收藏  |  浏览/下载:8/0  |  提交时间:2019/04/30
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases 会议论文
Beijing, PEOPLES R CHINA, JUN 08-11, 2011
作者:  Hu, Haibo[1];  Yang, Dan[1];  Xiang, Hong[1];  Fu, Li[1];  Ye, Chunxiao[2]
收藏  |  浏览/下载:0/0  |  提交时间:2019/11/28
ATTACK SCENARIOS FOR POSSIBLE MISUSE OF PERIPHERAL PARTS IN THE GERMAN HEALTH INFORMATION INFRASTRUCTURE 会议论文
Funchal, Madeira, Portugal 【会议录】, 2010
作者:  AlexanderKaletsch;  AliSunyaev;  SebastianDunnebeil;  HelmutKrcmar
收藏  |  浏览/下载:0/0  |  提交时间:2020/01/04
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme 会议论文
2008
作者:  Tong-LeeLim;  TieyanLi
收藏  |  浏览/下载:6/0  |  提交时间:2020/01/13
An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization 会议论文
2009
作者:  Yasin,N.M.;  Norman,A.A.
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/13


©版权所有 ©2017 CSpace - Powered by CSpace