共 50 条
- [1] Data mining techniques for information security applications [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
- [4] Analyzing Different Domains using Data Mining Techniques [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 99 - 104
- [5] Information Security:A review of information security issues and techniques [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
- [6] Analyzing the real time electricity data using data mining techniques [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 545 - 549
- [8] Analyzing Teaching Performance of Instructors Using Data Mining Techniques [J]. INFORMATICS IN EDUCATION, 2011, 10 (02): : 245 - 257
- [9] Analyzing Privacy and Security Issues in the Information Age [J]. CEA'09: PROCEEDINGS OF THE 3RD WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 220 - +
- [10] Security issues for data warehousing and data mining [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 11 - 20