共 50 条
- [21] Intrusion Detection Model Based on TF.IDF and C4.5 Algorithms [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2021, 24 (04): : 1691 - 1698
- [23] Parameter determination and feature selection for C4.5 algorithm using scatter search approach [J]. Soft Computing, 2012, 16 : 63 - 75
- [25] A scenario-based approach to protocol design using evolutionary techniques [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, 2004, 3005 : 178 - 187
- [27] Scenario-based verification in presence of variability using a synchronous approach [J]. Frontiers of Computer Science, 2013, 7 : 650 - 672
- [28] Trust Based Secure Friend Recommendation System for OSN Using C4.5 [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
- [29] Formal Modeling of C. elegans development: A scenario-based approach [J]. COMPUTATIONAL METHODS IN SYSTEMS BIOLOGY, PROCEEDINGS, 2003, 2602 : 4 - 20
- [30] Discrimination of Particle-Initiated Defects in Gas-Insulated System Using C4.5 Algorithm [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 191 - 196