منابع مشابه
Soft Computing Techniques in Cyber Defense
Artificial intelligence is a technology to make the machines human compatible. Various techniques likeheuristic search (Generate and test, Hill climbing, BFS, DFS, Problem reduction, constraint satisfaction, means-ends analysis etc.), game playing, understanding, planning, NLP, Learning, commonsense, predictions and actions, and expert systems are there to make the system intelligent. This pape...
متن کاملSoft Computing Techniques for Dependable Cyber-Physical Systems
Cyber-Physical Systems (CPS) allow us to manipulate objects in the physical world by providing a communication bridge between computation and actuation elements. In the current scheme of things, this sought-after control is marred by limitations inherent in the underlying communication network(s) as well as by the uncertainty found in the physical world. These limitations hamper fine-grained co...
متن کاملInvestigating electrochemical drilling (ECD) using statistical and soft computing techniques
In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...
متن کاملNeuromorphic Computing for Cognitive Augmentation in Cyber Defense
The growth of digital content and information through the World Wide Web is increasing rapidly and more of this traffic is generated by smart mobile low size, weight, and power (SWaP) devices that are constantly sending/receiving information to/from the network for up-to-date operation. In terms of data, according to an IDC report by Gantz and Reinsel in 2012 [1], from 2005 to 2020, the digital...
متن کاملThe Use of Cyber-Defense Exercises in Undergraduate Computing Education
This paper describes the placement of a large-scale cyberdefense exercise within the computer science and information technology curricula at an undergraduate institution, the United States Military Academy. Specifically, we describe the US National Security Agency Cyber-Defense Exercise as an example of a large-scale design, implement, and defend exercise. Furthermore, we provide evidence that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/7919-1217