Dictionnaire français - anglais

informatique et traitement des données - iate.europa.eu
Research article strong laws of large numbers for arrays of rowwise ρ∗-mixing random variables... This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited....
informatique et traitement des données - core.ac.uk - PDF: emis.maths.tcd.ie
Open access 151 conceptualization of hypersexual disorder with the behavioral-cognitive inhibition theory... This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited....
Doi:10.1155/2007/74191 research article on the lower bound for the number of real roots of a random algebraic equation... This is an open access article distributed under the Cre-ative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited....
informatique et traitement des données - iate.europa.eu
An argumentation-based framework to address the attribution problem in cyber-warfare... In this paper, we introduce a formal reason-ing system called the InCA (Intelligent Cyber Attribution) framework that is designed to aid an analyst in the attri-bution of a cyber-operation even when the available infor-mation is conflicting and/or uncertain....
général - core.ac.uk - PDF: nms.kcl.ac.uk
Vice or virtue? exploring the dichotomy of an offensive security engineer and government “hack back” policies... Utilizing the virtue (ethics) theory and cyber attribution, we argue that there exists a dichotomy among offensive security engineers, one that appreciates organizational security practices, but at the same time violates...
Threats, countermeasures and attribution of cyber attacks on critical infrastructures... Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping
 PDF: eudl.eu
A multi-disciplinary framework for cyber attribution...systems.A purely technical approach to cyber attribution has been found to be ineffective in the majority of cases,taking too narrow approach to the attribution problem....
Cyber attribution: an argumentation-based approach... In this paper, we introduce a formal reasoning system called the InCA (Intelligent Cyber Attribution) framework that is designed to aid an analyst in the attribution of a cyber-operation even when the available information is conflicting and/or uncertain....

Publications scientifiques

N-gram-based author profiles for authorship attributionWe present a novel method for computer-assisted authorship attribution based on character-level n-gram author profiles, which is motivated by an almost-forgotten, pioneering method in 1976....
recherche et propriété intellectuelle / informatique et traitement des données - core.ac.uk - PDF: citeseerx.ist.psu.edu
The character in the letter: epistolary attribution in... We examine Samuel Richardson’s Clarissa, lauded as a watershed example of the epistolary novel, using a recently developed and highly successful authorship attribution technique to determine (i) whether Richardson can construct distinct character writeprints, and (ii) if so, which linguistic features he manipulated to do so....
recherche et propriété intellectuelle / informatique et traitement des données - core.ac.uk - PDF: www.socsci.uci.edu

Exemples français - anglais

fiscalité - iate.europa.eu
fiscalité - iate.europa.eu
analyse économique - iate.europa.eu
commercialisation / économie - iate.europa.eu
[...]


1 milliard de traductions classées par domaine d'activité en 28 langues