Analysis Of Machine Learning Techniques By Using Blogger
暂无分享,去创建一个
[1] Bradley M. Okdie,et al. Personal Blogging; Individual Differences and Motivations , 2010 .
[2] Ali A. Ghorbani,et al. A Novel Approach for Social Behavior Analysis of the Blogosphere , 2008, Canadian Conference on AI.
[3] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .
[4] G. Guyatt,et al. The independent contribution of driver, crash, and vehicle characteristics to driver fatalities. , 2002, Accident; analysis and prevention.
[5] P J Ossenbruggen,et al. Roadway safety in rural and small urbanized areas. , 2001, Accident; analysis and prevention.
[6] Jian-Jun Li,et al. Intrusion detection based on clustering genetic algorithm , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[7] Mohammad Reza Norouzian,et al. Classifying attacks in a network intrusion detection system based on artificial neural networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[8] D. Lavanya,et al. Performance Evaluation of Decision Tree Classifiers on Medical Datasets , 2011 .
[9] Ian H. Witten,et al. Generating Accurate Rule Sets Without Global Optimization , 1998, ICML.
[10] Pedro M. Domingos,et al. On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.
[11] A. El-Semary,et al. Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection , 2006, 2006 IEEE Information Assurance Workshop.
[12] Young-Jun Kweon,et al. Overall injury risk to different drivers: combining exposure, frequency, and severity models. , 2003, Accident; analysis and prevention.
[13] Wolfgang Nejdl,et al. Analyzing Political Trends in the Blogosphere , 2011, ICWSM.
[14] Sri Hartati Kusrini. IMPLEMENTATION OF C4.5 ALGORITHM TO EVALUATE THE CANCELLATION POSSIBILITY OF NEW STUDENT APPLICANTS AT STMIK AMIKOM YOGYAKARTA , 2009 .
[15] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[16] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[17] Dewan Md. Farid,et al. Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..
[18] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[19] W M Evanco,et al. The potential impact of rural mayday systems on vehicular crash fatalities. , 1999, Accident Analysis and Prevention.
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[21] Václav Snásel,et al. Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[22] Mohamed Abdel-Aty,et al. Analysis and prediction of traffic fatalities resulting from angle collisions including the effect of vehicles' configuration and compatibility. , 2004, Accident; analysis and prevention.
[23] Elisabeth Lex,et al. Crosslanguage blog mining and trend visualisation , 2009, WWW '09.
[24] Marcos M. Campos,et al. Creation and deployment of data mining-based intrusion detection systems in Oracle Database l0g , 2005, Fourth International Conference on Machine Learning and Applications (ICMLA'05).