Open Access
Issue
SHS Web of Conf.
Volume 44, 2018
IV International Scientific Conference “The Convergence of Digital and Physical Worlds: Technological, Economic and Social Challenges” (CC-TESC2018)
Article Number 00068
Number of page(s) 10
DOI https://doi.org/10.1051/shsconf/20184400068
Published online 05 June 2018
  1. K. Schwab, The Fourth Industrial Revolution (Crown Business, New York, 2016) [Google Scholar]
  2. P. Tran, Navigating Smart Cities: A Q&A with RSA’s Peter Tran [online], Available at: http://www.itproportal.com/features/navigating-smart-cities-a-qa-with-rsas-peter-tran/ (2017) [Google Scholar]
  3. M. Kalinin, P. Zegzhda, D. Zegzhda, Y. Vasiliev, V. Belenko, Proceedings of 7th International Conference on Information and Communication Technology Convergence (ICTC2016) (2016) [Google Scholar]
  4. Kaspersky Security Bulletin 2016, Forecast for 2017: the end “of virus indicators” [online], Available at: https://securelist.ru/files/2016/11/KSB_Predictions_2017_RUS.pdf (2016) [Google Scholar]
  5. L. Rokach, When Cyber Security Meets Machine Learning [online], Available at: http://ucys.ugr.es/jnic2016/docs/MachineLearning_LiorRokachJNIC2016.pdf (2016) [Google Scholar]
  6. CS259D: Data Mining foe Cyber Security [online], Available at: https://web.stanford.edu/class/cs259d/lectures/Session2.pdf (2017) [Google Scholar]
  7. D. Barbara, S. Jajodia, Applications of data mining in computer security [online], Available at: http://www.cs.odu.edu/~mukka/cs795sum10dm/Lecturenotes/Day7/Barbara%20Jajodia%20Data%20Mining%20Book.pdf (2002) [CrossRef] [Google Scholar]
  8. R. Pascanu, T. Mikolov, Y. Bengio, Proceedings of the 30th International Conference on International Conference on Machine Learning, on the difficulty of learning recurrent neural networks, 28 (2013) [Google Scholar]
  9. R. Demidov, A. Pechenkin, Approach to software security analysis based on vector representation of a machine code, 4 (2017) [Google Scholar]
  10. H. Sak, A. Senior, F. Beaufays, Proceedings of the Annual Conference of the International Speech Communication Association, Long short-term memory recurrent neural network architectures for large scale acoustic modelling (2014) [Google Scholar]
  11. L. Bottou, Machine Learning, From machine learning to machine reasoning, 94 (2) (2014) [Google Scholar]
  12. T. Mikolov, W.-T. Yih, G. Zweig, Proceedings of NAACL-HLT “Linguistic regularities in continuous space word representations” (2013) [Google Scholar]
  13. Y. Lecun, L. Bottou, Y. Bengio, P. Haffner, Proceedings of the IEEE “Gradient-based learning applied to document recognition”, 86 (11) (1998) [Google Scholar]
  14. B. Bakker, IEEE International Symposium on Approximate Dynamic Programming and Reinforcement Learning, “Reinforcement learning by back propagation through an LSTM model/critic (2007) [Google Scholar]
  15. Keystone, The Ultimate Assembler [online], Available at: http://www.keystone-engine.org/ (2018) [Google Scholar]
  16. Unicorn, The Ultimate CPU emulator [online], Available at: http://www.unicorn-engine.org/ (2018) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.