Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis
暂无分享,去创建一个
T.T. Teoh | Graeme Chiew | Yeaz Jaddoo | H. Michael | A. Karunakaran | Y.J. Goh | T. Teoh | G. Chiew | Y. Jaddoo | H. Michael | A. Karunakaran | Y. Goh
[1] Ian H. Witten,et al. Weka: Practical machine learning tools and techniques with Java implementations , 1999 .
[2] Liqing Zhang,et al. Quantitative prediction of the effect of genetic variation using hidden Markov models , 2014, BMC Bioinformatics.
[3] J. Rice. Mathematical Statistics and Data Analysis , 1988 .
[4] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[5] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[6] R. Boddy,et al. Statistical Methods in Practice: For Scientists and Technologists , 2009 .
[7] E. Teller,et al. Regression and Correlation Analysis , 1990 .
[8] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .