共 50 条
- [42] Identifying False Alarm Rates for Intrusion Detection System with Data Mining INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 95 - 99
- [43] Identifying Drivers of Inefficiency in Business Processes: A DEA and Data Mining Perspective ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2010, 50 : 120 - 132
- [45] Identifying Fraudulent Online Transactions Using Data Mining and Statistical Techniques 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 321 - 324
- [46] From data to knowledge mining AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2009, 23 (04): : 427 - 441
- [47] Generic Trajectory Model for Network Centric Warfare Enhanced Using Data Mining 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 487 - 490
- [48] An Automatic Identification System (AIS) Database for Maritime Trajectory Prediction and Data Mining PROCEEDINGS OF ELM-2016, 2018, 9 : 241 - 257
- [49] THE TRAJECTORY DATA MINING MODEL FOR COLLEGE STUDENTS IN COMPUS LIFE AND ACADEMIC MANAGEMENT SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3225 - 3240
- [50] Classifying and identifying of threats in E-mails - Using data mining techniques IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 562 - 566