Application of data mining in computer security.
From MaRDI portal
Publication:1418411
zbMath1041.68003MaRDI QIDQ1418411
No author found.
Publication date: 11 January 2004
Published in: Advances in Information Security (Search for Journal in Brave)
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Network design and communication in computer systems (68M10)
Related Items
Understanding and enhancement of internal clustering validation indexes for categorical data ⋮ Cluster validity functions for categorical data: a solution-space perspective ⋮ SEP/COP: an efficient method to find the best partition in hierarchical clustering based on a new cluster validity index