Cyber Space Security Assessment Case Study
暂无分享,去创建一个
Abdel-Badeeh M. Salem | Mohamed Hamdy | Hanaa. M. Said | Rania El Gohary | R. E. Gohary | M. Hamdy | A. M. Salem
[1] Moustafa Ghanem,et al. Real-Time Data Mining Methodology and a Supporting Framework , 2009, 2009 Third International Conference on Network and System Security.
[2] Margaret H. Dunham,et al. Data Mining: Introductory and Advanced Topics , 2002 .
[3] Henda Hajjami Ben Ghézala,et al. A Framework for Data Mining Based Multi-Agent: An Application to Spatial Data , 2005, WEC.
[4] Bhavani M. Thuraisingham,et al. Data mining and cyber security , 2003, Third International Conference on Quality Software, 2003. Proceedings..
[5] Marc Dacier,et al. Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology , 2008, 2008 IEEE International Conference on Data Mining Workshops.
[6] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[7] Jaideep Vaidya,et al. Privacy preserving collaborative filtering for SaaS enabling PaaS clouds , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[8] Yun Chen,et al. Probabilistic Techniques for Corporate Blog Mining , 2007, PAKDD Workshops.
[9] Marco Mellia,et al. Characterization of community based-P2P systems and implications for traffic localization , 2012, Peer-to-Peer Networking and Applications.
[10] Padhraic Smyth,et al. From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..
[11] Yingqin Zheng,et al. Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law , 2012, Computational Intelligence for Privacy and Security.
[12] Rajesh Kumar,et al. A review on particle swarm optimization algorithms and their applications to data clustering , 2011, Artificial Intelligence Review.
[13] Eugene H. Spafford,et al. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense , 2009, ISIPS.