Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of data mining and machine learning methods for cyber security intrusion detection
AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …
The use of computational intelligence in intrusion detection systems: A review
SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
[KIRJA][B] Internet of things applications-from research and innovation to market deployment
O Vermesan, P Friess - 2014 - library.oapen.org
The book aims to provide a broad overview of various topics of Internet of Things from the
research, innovation and development priorities to enabling technologies, nanoelectronics …
research, innovation and development priorities to enabling technologies, nanoelectronics …
[KIRJA][B] Advanced data mining techniques
The intent of this book is to describe some recent data mining tools that have proven
effective in dealing with data sets which often involve unc-tain description or other …
effective in dealing with data sets which often involve unc-tain description or other …
Frequent item set mining
C Borgelt - Wiley interdisciplinary reviews: data mining and …, 2012 - Wiley Online Library
Frequent item set mining is one of the best known and most popular data mining methods.
Originally developed for market basket analysis, it is used nowadays for almost any task that …
Originally developed for market basket analysis, it is used nowadays for almost any task that …
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems
Security policies of information systems and networks are designed for maintaining the
integrity of both the confidentiality and availability of the data for their trusted users …
integrity of both the confidentiality and availability of the data for their trusted users …
RCFile: A fast and space-efficient data placement structure in MapReduce-based warehouse systems
MapReduce-based data warehouse systems are playing important roles of supporting big
data analytics to understand quickly the dynamics of user behavior trends and their needs in …
data analytics to understand quickly the dynamics of user behavior trends and their needs in …
Internet of things strategic research and innovation agenda
O Vermesan, P Friess, P Guillemin… - Internet of …, 2022 - taylorfrancis.com
Internet of Things (IoT) is a concept and a paradigm that considers pervasive presence in
the environment of a variety of things/objects that through wireless and wired connections …
the environment of a variety of things/objects that through wireless and wired connections …
Mining association rules with weighted items
CH Cai, AWC Fu, CH Cheng… - Proceedings. IDEAS'98 …, 1998 - ieeexplore.ieee.org
Discovery of association rules has been found useful in many applications. In previous work,
all items in a basket database are treated uniformly. We generalize this to the case where …
all items in a basket database are treated uniformly. We generalize this to the case where …
Internet of things beyond the hype: Research, innovation and deployment
O Vermesan, P Friess, P Guillemin… - … Society-Internet of …, 2022 - taylorfrancis.com
Internet of Things (IoT) is a concept and a paradigm that considers pervasive presence in
the environment of a variety of things/objects that through wireless and wired connections …
the environment of a variety of things/objects that through wireless and wired connections …