International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022): Proceedings

Published on: 2022-11-04
Page Count: 279 pages
Print Type: BOOK
Maturity Rating: NOT_MATURE
Language: en
Embeddable: Yes
PDF Available: Yes
EPUB Available: Yes
ISBN-13: 9783031184093
ISBN-10: 3031184092
Proceedings Pablo García Bringas, Hilde Pérez García, Francisco Javier Martínez de Pisón, José Ramón Villar Flecha, Alicia Troncoso Lora, Enrique A. de la Cal, Álvaro Herrero, Francisco ... Ouchani, Samir, 12 Ovejero, Álvaro, 216 P Pałczy ...

Related books - Readers Also Liked

International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023): Proceedings

... gradient descent algorithm . Then , the algo- rithm is fitted to different ... Octave programming language . During the last two academic years , the ... Octave , Python and both . © The Editor(s) (if applicable) and The Author(s), under ...

13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)

... foolbox library1. 1 https://github.com/bethgelab/foolbox. For the experiment, a dataset of breast cancer images was 318 X. Echeberria-Barrio et al. 2.1 Adversarial Training (Reactive) 2.2 Dimensionality Reduction (Proactive) 2.3 ...

International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain, June 25th-27th, 2014, Proceedings

... ICS 0 2000 4000 6000 8000 10000 12000 14000 16000 18000 0 20 40 60 80 Test Inputs Fig. 2. Disturbance Rejection of ANN-ICS 0 2000 4000 6000 8000 10000 12000 14000 16000 18000 0 20 40 60 80 100 120 Test Inputs GP−ICS PI−ICS Confidence ...

International Joint Conference CISIS’12-ICEUTE ́12-SOCO ́12 Special Sessions

... RojaDirecta saga should make clear why the software industry -and the content industry- is looking for new enforcement tools [1]. When the Internet was not so popular, sharing licenses was hard and the methods employed to protect ...

International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding

... Babyplast micro injection machine was used to carry out the tests. Two types of polymeric material were used: Polypropylene ISPLEN PC47AVC and Polyethylene REPSOL PE017. The objective was to make the system generic enough from the ...

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

... name server, which is topologically near the infected host by analyzing DNS query streams characteristics at flow ... name server once an email worm-infected user machine has been detected to con- tain email worm propagation. References. http ...

Computational Intelligence in Security for Information Systems: 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, Proceedings

... Craig S. Wright and Tanveer A. Zia Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls .............................. 206 Craig S. Wright and Tanveer A. Zia An Approach for ...

The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020)

... RESME Seventh Congress of the European Society for Research in Mathematics Education, pp. 766–775. European Society for Research in Mathematics Education (RESME), University of Rzeszów, Poland (2011) 8. Estrella, S., Olfos, R., Mena ...

Computational Intelligence in Information Systems: Proceedings of the Computational Intelligence in Information Systems Conference (CIIS 2016)

... Dog-toothed Cat Snake 25 7 Black naja sputatrix 11 18 Asian Rat Snake 33 8 Ophiohagus Hannah 28 19 Copperhead Rat Snake 7 9 Boa constrictor 29 20 Yello Naja Sputatrix 8 10 Oriental rat snake 10 21 Javelin Sand Boa 4 11 Mangrove snake 7 ...

Computational Intelligence in Information Systems: Proceedings of the Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)

... 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Badecker, W., Caramazza, A.: Morphology and aphasia. In: Spencer, A., Zwicky, A.M. (eds.) Handbook of Morphology, pp. 390–406. Blackwell, Oxford (1998) 2 ... Academy of Sciences of the United ...

Lecture Notes in Data Engineering, Computational Intelligence, and Decision Making: 2022 International Scientific Conference "Intellectual Systems of Decision-Making and Problems of Computational Intelligence”, Proceedings

... molar volume c ) Oxygen temperature increasing vs the initial molar volume 0.010 0.015 0.020 Initial molar volume e ) Hydrogen temperature increasing vs the initial molar volume Temperature increasing -20 -40 -60 -80 0.010 0.015 0.020 ...

Complex, Intelligent and Software Intensive Systems: Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021)

... Multan Electric Power Company (MEPCO) to detect electricity theft. However, the suggested method requires a significant amount of time for training the model. Conventional data driven techniques face issues when classifying daily and ...

13th National Computer Security Conference: Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 : Proceedings : Information Systems Security, Standards, the Key to the Future

... COMPUSEC requirements , its analysis is restricted to risks that can be mitigated by changes in the operational concept , the proposed network architecture , and the set of COMPUSEC safeguards provided by the systems in the network . In ...

Complex, Intelligent, and Software Intensive Systems: Proceedings of the 13th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2019)

... Scrum methodology, which could be incorporated into this Trello-based method. References 1. Beck, K., Beedle, M ... institute.org: The scrum product backlog (2019). https://www.scruminstitute.org/TheScrum ProductBacklog.php 18. 19. 20 ...

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I

8th International Conference on Artificial Intelligence and Security, ICAIS ... (2017) 17. Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look ... helmet detection based on YOLOv5. In: IEEE International Conference on Power ...

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II

... Tree. Diagram. of. Tibetan. Case. Grammar. 4.1 Fillmore Case Grammar In Fillmore case grammar, a sentence consists of modality and proposition. If we represent a ... Grammar 4.1 Fillmore Case Grammar 4.2 Tibetan Tree Diagram Based on Case ...

15th International Conference on Applications of Fuzzy Systems, Soft Computing and Artificial Intelligence Tools – ICAFS-2022

... B2B, B2C, B2E, G2C, C2C variations [2]. B2C or business to customer variant is the most popular one in e-commerce, where the companies such as Amazon, Alibaba, eBay, or Spotify sell products and services to the customers. Use of online ...

Proceedings of the 2nd International Joint Conference on Hospitality and Tourism, IJCHT 2022, 6-7 October 2022, Singaraja, Bali, Indonesia: IJCHT 2022

... Evaluation of External Factor External factor analysis was performed using the external factor evaluation (EFE) matrix. The IFE matrix can show internal factors' main opportunities and challenges to strengthen the Banyuwangi tourism ...

Advances in Computational Intelligence: 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part I

... Schematic representation of the architecture used in Aguilar Canto (2020) and adapted to this task. A convolutional ... MacBook Pro 2012, with the operative system MacOS Catalina 10.15.6 and intregated webcam as an input. 3.3 Evaluation ...

Enterprise, Business-Process and Information Systems Modeling: 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6–7, 2022, Proceedings

... Facets of work is an extension of WST that supports a deeper understanding ... advertising budget. In a totally automated work system, an optimization model ... results, risk aversion Association with evaluation criteria Actual decision ...

ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and Security "

... stamp, we retrieve data from the camera 1 on the 30th of March 2013 for each ... value in seconds could be established from the hex code in the following ... value of the hour. Bit 2 was a record keeper of how many cycles offset 30 had ...

Computational Learning Theory: 14th Annual Conference on Computational Learning Theory, COLT 2001 and 5th European Conference on Computational Learning Theory, EuroCOLT 2001, Amsterdam, The Netherlands, July 16-19, 2001, Proceedings

14th Annual Conference on Computational Learning Theory, COLT 2001 and 5th European ... Dungeons and Dragons. In this new game, players read short texts — which ... download the game software (presumably written in Java) from the project ...

ECCWS2014-Proceedings of the 13th European Conference on Cyber warefare and Security: ECCWS 2014

... paper espionage and reconnaissance, propaganda and social warfare, disabling ... Opinion Identification in Hate Group Web Forums (Ming and Hsinchun, 2012) ... trafficking (Poelmans et al., 2012). This research proposes a semi‐automated ...

Artificial Intelligence and Information-control Systems of Robots '94: Proceedings of the Sixth International Conference on Artificial Intelligence and Information-Control Systems of Robots, Smolenice Castle, Slovakia, Sep 12-16, 1994

Proceedings of the Sixth International Conference on Artificial Intelligence ... presentation techniques in that special domain must be represented . With ... Intelligent media presentation Widun Component Layer shared knowledge text ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.