dabble 发表于 2025-3-21 18:42:31
书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0620350<br><br> <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0620350<br><br> <br><br>不可侵犯 发表于 2025-3-21 22:26:25
http://reply.papertrans.cn/63/6204/620350/620350_2.pngoverhaul 发表于 2025-3-22 00:36:27
http://reply.papertrans.cn/63/6204/620350/620350_3.png北极熊 发表于 2025-3-22 04:49:33
http://reply.papertrans.cn/63/6204/620350/620350_4.png绝种 发表于 2025-3-22 10:08:56
Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samplesdetection models in various scenarios. However, it often suffers from training data over-fitting. In this paper, we propose a supervised machine learning method for cyber-threat detection, which modifies the training set to reduce data over-fitting when training a deep neural network. This is done bExternalize 发表于 2025-3-22 13:38:15
http://reply.papertrans.cn/63/6204/620350/620350_6.pngNOVA 发表于 2025-3-22 17:27:16
http://reply.papertrans.cn/63/6204/620350/620350_7.png婴儿 发表于 2025-3-22 22:48:59
http://reply.papertrans.cn/63/6204/620350/620350_8.pngExpediency 发表于 2025-3-23 02:08:34
IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network the field of cybersecurity. Many researchers have already proposed several anti-phishing approaches to detect phishing in terms of email, webpages, images, or links. This study also aimed to propose and implement an intelligent framework to detect phishing URLs (Uniform Resource Locator). It has beprostatitis 发表于 2025-3-23 07:18:11
http://reply.papertrans.cn/63/6204/620350/620350_10.png