Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-5 ل  5 نتائج ل ""Computing Methodologies""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

Mining in Logarithmic Space with Variable Difficulty

Subjects: • Computing methodologies → Concurrent algorithms; • Theory of computation → Distributed algorithms; Security and privacy → Distributed systems securityTapei; Taiwan

  • Source: ACM SIGSAC Conference on computer and communications security (CCS) ; CCS 2025 - Conference on computer and communications security ; https://cnrs.hal.science/hal-05294549 ; CCS 2025 - Conference on

تفاصيل العنوان

×
Conference

SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization

Subjects: Security and privacy → Intrusion detection systems; • Computing methodologies → Machine learning Intrusion Detection Systems; Zero-Day DetectionVienna; Austria

  • Source: Proceedings of ARES'24 ; ARES 2024: The 19th International Conference on Availability, Reliability and Security ; https://imt-atlantique.hal.science/hal-04792982 ; ARES 2024: The 19th International

تفاصيل العنوان

×
Conference

Detecting Illicit Entities in Bitcoin using Supervised Learning of Ensemble Decision Trees

Subjects: CCS Concepts: • Computing methodologies → Artificial intelligence; Boosting Bitcoin; Fraud detectionParis; France

  • Source: ICICM 2020 : 10th International Conference on Information Communication and Management ; https://imt-atlantique.hal.science/hal-02952081 ; ICICM 2020 : 10th International Conference on Information

تفاصيل العنوان

×
  • 1-5 ل  5 نتائج ل ""Computing Methodologies""