Notice of Violation of IEEE Publication Principles Detecting Terror-Related Activities on the Web with Using Data Mining Techniques
暂无分享,去创建一个
[1] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[2] Tom Fawcett,et al. Robust Classification for Imprecise Environments , 2000, Machine Learning.
[3] George Karypis,et al. CLUTO - A Clustering Toolkit , 2002 .
[4] Murugan Anandarajan,et al. Classifying inventory using an artificial neural network approach , 2002 .
[5] Matjaz Kukar,et al. Quality assessment of individual classifications in machine learning and data mining , 2006, Knowledge and Information Systems.
[6] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[7] Sheng Zhong,et al. Privacy-Preserving Classification of Customer Data without Loss of Accuracy , 2005, SDM.
[8] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).