共 50 条
- [21] An evaluation of clone detection techniques for identifying crosscutting concerns 20TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2004, : 200 - 209
- [22] Clone detection in source code by frequent itemset techniques FOURTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2004, : 128 - 135
- [24] COMPARATIVE ANALYSIS OF THE SPECTRUM SENSING TECHNIQUES ENERGY DETECTION AND CYCLOSTATIONARY FEATURE DETECTION INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2015, 7 (03): : 23 - 30
- [26] Comparative Analysis of Edge Detection Techniques for extracting Refined Boundaries PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 1 - 10
- [27] A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 191 - 207
- [28] A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware 2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
- [29] Comparative analysis of two techniques for detection and segmentation of moving bodies 2013 JOINT URBAN REMOTE SENSING EVENT (JURSE), 2013, : 9 - 12
- [30] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378