attenuate 发表于 2025-3-26 21:07:19

http://reply.papertrans.cn/47/4640/463912/463912_31.png

确定无疑 发表于 2025-3-27 01:48:19

http://reply.papertrans.cn/47/4640/463912/463912_32.png

大沟 发表于 2025-3-27 05:55:42

Mitsue Furusawa,Nobuhiro Inuzuka,Hirohisa Seki,Hidenori Itohpear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83% of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.

发表于 2025-3-27 10:21:49

http://reply.papertrans.cn/47/4640/463912/463912_34.png

PATHY 发表于 2025-3-27 16:48:48

http://reply.papertrans.cn/47/4640/463912/463912_35.png

群居男女 发表于 2025-3-27 20:54:56

http://reply.papertrans.cn/47/4640/463912/463912_36.png

AGONY 发表于 2025-3-28 00:05:49

http://reply.papertrans.cn/47/4640/463912/463912_37.png

neuron 发表于 2025-3-28 03:33:49

Maximum Entropy modeling with Clausal Constraints, .(.|.) (where .(.|.) (.(.|.)) equals the induced (observed) probability of an instance . belonging to a class .). First experiments indicate . may be useful for prediction, and for classification in cases where the induced model should be combined with other stochastic information sources.

嫌恶 发表于 2025-3-28 09:18:58

http://reply.papertrans.cn/47/4640/463912/463912_39.png

接触 发表于 2025-3-28 14:30:36

http://reply.papertrans.cn/47/4640/463912/463912_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Inductive Logic Programming; 7th International Wo Nada Lavrač,Sašo Džeroski Conference proceedings 1997 Springer-Verlag Berlin Heidelberg 1