矜持 发表于 2025-3-21 18:50:19

书目名称Data Science in Cybersecurity and Cyberthreat Intelligence影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0263126<br><br>        <br><br>书目名称Data Science in Cybersecurity and Cyberthreat Intelligence读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0263126<br><br>        <br><br>

改变立场 发表于 2025-3-21 22:21:35

http://reply.papertrans.cn/27/2632/263126/263126_2.png

教义 发表于 2025-3-22 00:34:11

http://reply.papertrans.cn/27/2632/263126/263126_3.png

水獭 发表于 2025-3-22 06:18:23

http://reply.papertrans.cn/27/2632/263126/263126_4.png

Compass 发表于 2025-3-22 08:49:37

Amrina Ferdous,Md. Abu Shahin,Md. Ayub Alicurity threats is further and further growing. In this chapter, we introduce an approach for identifying hidden security threats by using Uniform Resource Locators (URLs) as an example dataset, with a method that automatically detects malicious URLs by leveraging machine learning techniques. We demo

Androgen 发表于 2025-3-22 16:25:17

Md. Jahanur Rahman,Md. Al Mehedi Hasans for network attack and anomaly detection. The approach is characterized by several layers of data processing, including extraction and decomposition of datasets, compression of feature vectors, training, and classification. To reduce the dimension of the analyzed feature vectors, principal compone

Androgen 发表于 2025-3-22 17:49:54

A. Zahiri,H. Md. Azamathulla,Kh. Ghorbanis smart phones and wearables that have been adopted for personal use in everyday life, has produced a demand for utilities that can assist people with achieving goals for a successful lifestyle, i.e., to live healthier and more productive lives. With continued research and development into technolog

来这真柔软 发表于 2025-3-23 00:33:25

http://reply.papertrans.cn/27/2632/263126/263126_8.png

并入 发表于 2025-3-23 04:33:36

Data Science in Cybersecurity and Cyberthreat Intelligence978-3-030-38788-4Series ISSN 1868-4394 Series E-ISSN 1868-4408

男生如果明白 发表于 2025-3-23 08:23:33

https://doi.org/10.1007/978-3-030-38788-4Cybersecurity; Cybersituational Awareness; Cyberthreat Intelligence; Data Science; Artificial Intelligen
页: [1] 2 3 4
查看完整版本: Titlebook: Data Science in Cybersecurity and Cyberthreat Intelligence; Leslie F. Sikos,Kim-Kwang Raymond Choo Book 2020 Springer Nature Switzerland A