共 50 条
- [1] Evaluation of users' adaptation by applying LZW compression algorithm to operation logs KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 625 - 631
- [4] Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs 2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 28 - 37
- [5] Identifying Users' Emotional States through Keystroke Dynamics DELTA: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON DEEP LEARNING THEORY AND APPLICATIONS, 2022, : 207 - 214
- [6] Geo-Identification of Web Users through Logs using ELK Stack 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, : 606 - 610
- [9] Identifying Influential Users on Instagram Through Visual Content Analysis IEEE ACCESS, 2020, 8 : 169594 - 169603
- [10] Identifying Queries in Instant Search Logs SIGIR '21 - PROCEEDINGS OF THE 44TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2021, : 1692 - 1696