Linked e-resources

Details

The Use of Reference Graphs in the Entity Resolution of Criminal Networks
Heterogeneous Information Networks Bi-clustering with Similarity Regularization
A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages
Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank
Stratified Over-sampling Bagging Method for Random Forests on Imbalanced Data
Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly Detection
Incremental Privacy-Preserving Association Rule Mining Using Negative Border
Differentially Private Multi-task Learning
Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-Temporal Data
Cyber security and Infrastructure Protection k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach
A Syntactic Approach for Detecting Viral Polymorphic Malware Variants
Small State Acquisition of Offensive Cyber warfare Capabilities: Towards Building an Analytical Framework
Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements
Information Security in Software Engineering, Analysis of Developers Communications about Security in Social Q&A Website.

Browse Subjects

Show more subjects...

Statistics

from
to
Export