Clustering Algorithms and Data Streams for Supervised Control of Data and Prevention of Threats in Mobile Application Systems
暂无分享,去创建一个
[1] Jennifer Widom,et al. Models and issues in data stream systems , 2002, PODS.
[2] Gaurav Tandon,et al. Machine learning for host-based anomaly detection , 2008 .
[3] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[4] Marcus A. Maloof,et al. Machine Learning and Data Mining for Computer Security , 2006 .
[5] Ian H. Witten,et al. Chapter 1 – What's It All About? , 2011 .
[6] Zdravko Markov,et al. Data mining the web - uncovering patterns in web content, structure, and usage , 2007 .
[7] Aneta Poniszewska-Marańda,et al. Security risks and their prevention capabilities in mobile application development , 2015 .
[8] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[9] Marcus A. Maloof,et al. Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing) , 2005 .
[10] Charu C. Aggarwal,et al. Data Streams: Models and Algorithms (Advances in Database Systems) , 2006 .