共 50 条
- [2] Activities of the Security Transparency Consortium to Enhance the Effective Use of Visualization Data NTT Technical Review, 2024, 22 (11): : 53 - 57
- [3] Security Related Data Mining 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 775 - 782
- [4] Data mining and Cyber security THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2
- [5] A review on security in Data Mining INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 70 - 74
- [6] Data mining for security applications INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 1 - 3
- [7] Data Mining for Security Applications EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 585 - 589
- [8] Data mining for security applications PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA'04), 2004, : 3 - 4
- [9] Security issues for data warehousing and data mining DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 11 - 20
- [10] Q-Mon: An Adaptive SOA System with Data Mining PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT & APPLICATIONS (SKIMA), 2016, : 304 - 308