Mostrando 5 resultados de: 5
Publisher
ACM Transactions on Sensor Networks(1)
Expert Systems with Applications(1)
Neural Networks(1)
Proceedings of the International Joint Conference on Neural Networks(1)
Studies in Computational Intelligence(1)
Área temáticas
Ciencias de la computación(5)
Assessment of geometric features for individual identification and verification in biometric hand systems
ArticleAbstract: This paper studies the reliability of geometric features for the identification of users based on haPalabras claves:Genetic Algorithms, Geometric features, Hand biometrics, User identificationAutores:Elizondo D., Esteban José Palomo, López-Rubio E., Luque-Baena R.M., Watson T.Fuentes:scopusApplication of growing hierarchical SOM for visualisation of network forensics traffic data
ArticleAbstract: Digital investigation methods are becoming more and more important due to the proliferation of digitPalabras claves:data clustering, Data visualisation, Feature Extraction, hierarchical self-organisation, Network forensicsAutores:Elizondo D., Esteban José Palomo, Luque-Baena R.M., North J., Watson T.Fuentes:scopusVisualisation of network forensics traffic data with a self-organising map for qualitative features
Conference ObjectAbstract: Digital crimes are a part of modern life but evidence of these crimes can be captured in network traPalabras claves:Autores:Elizondo D., Esteban José Palomo, Luque-Baena R.M., North J., Watson T.Fuentes:scopusSOM-based techniques towards hierarchical visualisation of network forensics traffic data
Conference ObjectAbstract: Current research is improving the quality and efficiency of digital investigation methods due to thePalabras claves:data clustering, Data visualisation, hierarchical self-organisation, Network forensicsAutores:Domínguez E., Elizondo D., Esteban José Palomo, Luque-Baena R.M., Watson T.Fuentes:scopusThreat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
ArticleAbstract: There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrainPalabras claves:computation offloading, Edge computing, internet of things, resource constrained, threat modelling, trustAutores:Bradbury M., Burton J., Butler M., Denys A. Flores, Jhumka A., Watson T.Fuentes:googlescopus