Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process
暂无分享,去创建一个
Kangfeng Zheng | Xiujuan Wang | Haoyang Tang | Yuanrui Tao | K. Zheng | Xiujuan Wang | Haoyang Tang | Yuanrui Tao
[1] Pabitra Mitra,et al. Modelling visual saliency using degree centrality , 2010 .
[2] Jianhua Dai,et al. Attribute selection based on information gain ratio in fuzzy rough set theory with application to tumor classification , 2013, Appl. Soft Comput..
[3] Murat Ince,et al. Web-based learning object selection software using analytical hierarchy process , 2014, IET Softw..
[4] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] Almudena Alcaide,et al. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management , 2016, IET Inf. Secur..
[6] Stephen Hailes,et al. Evolving attackers against wireless sensor networks using genetic programming , 2017, IET Wirel. Sens. Syst..
[7] Raul Tempone,et al. Fast Bayesian experimental design: Laplace-based importance sampling for the expected information gain , 2017, Computer Methods in Applied Mechanics and Engineering.
[8] J. Wood. Marine renewables face paperwork barrier [marine power generation] , 2005 .
[9] W. Knight. Caught in the net [Internet and e-mail security issues] , 2005 .
[10] Juan Martínez-Romo,et al. Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..
[11] Hao Li,et al. Unsupervised video anomaly detection using feature clustering , 2012, IET Signal Process..