Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods
Abstract Cross-Company Churn Prediction (CCCP) is a domain of research where one
company (target) is lacking enough data and can use data from another company (source) …
company (target) is lacking enough data and can use data from another company (source) …
Clustering categorical data: A survey
S Naouali, S Ben Salem, Z Chtourou - International Journal of …, 2020 - World Scientific
Clustering is a complex unsupervised method used to group most similar observations of a
given dataset within the same cluster. To guarantee high efficiency, the clustering process …
given dataset within the same cluster. To guarantee high efficiency, the clustering process …
Machine learning with digital forensics for attack classification in cloud network environment
S Sachdeva, A Ali - … Journal of System Assurance Engineering and …, 2022 - Springer
In this paper, various Distributed Denial of service attacks like Internet Control Message
Protocol Attack, Transmission Control Protocol Sync Attack, and User Datagram Protocol …
Protocol Attack, Transmission Control Protocol Sync Attack, and User Datagram Protocol …
Deep learning for customer churn prediction in e-commerce decision support
Churn prediction is a Big Data domain, one of the most demanding use cases of recent time.
It is also one of the most critical indicators of a healthy and growing business, irrespective of …
It is also one of the most critical indicators of a healthy and growing business, irrespective of …
Just-in-time customer churn prediction in the telecommunication sector
Due to the exponential growth in technologies and a greater number of competitors in the
telecom sector, the companies are facing a rigorous problem of customer churns. The …
telecom sector, the companies are facing a rigorous problem of customer churns. The …
Taxonomy of security attacks and risk assessment of cloud computing
M Swathy Akshaya, G Padmavathi - Advances in Big Data and Cloud …, 2019 - Springer
Cloud Computing is an international collection of hardware and software from thousands of
computer network. It permits digital information to be shared and distributed at very less cost …
computer network. It permits digital information to be shared and distributed at very less cost …
DDoS attack detection in Edge-IIoT using ensemble learning
Every Edge-IIoT device and network is susceptible to attacks because they are connected to
the internet. The number of IoT devices grows daily due to the rapid advancement in …
the internet. The number of IoT devices grows daily due to the rapid advancement in …
Countering malicious URLs in internet of things using a knowledge-based approach and a simulated expert
This article proposes a novel methodology to detect malicious uniform resource locators
(URLs) using simulated expert (SE) and knowledge-base system (KBS). The proposed study …
(URLs) using simulated expert (SE) and knowledge-base system (KBS). The proposed study …
Cyber attack prediction using social data analysis
B Munkhdorj, S Yuji - Journal of High Speed Networks, 2017 - journals.sagepub.com
The most common methods used in cyber attack detection are signature scan and anomaly
detection. In the case of applying these approaches, a countermeasure against an …
detection. In the case of applying these approaches, a countermeasure against an …
Rough set theory in the classification of loan applications
J Becker, A Radomska-Zalas, P Ziemba - Procedia Computer Science, 2020 - Elsevier
The article presents the results of the study, which is a fragment of the work carried out under
the project entitled “Hybrid system for intelligent diagnostics of prognostic models”, co …
the project entitled “Hybrid system for intelligent diagnostics of prognostic models”, co …