dabble 发表于 2025-3-21 18:42:31

书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0620350<br><br>        <br><br>书目名称Machine Intelligence and Big Data Analytics for Cybersecurity Applications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0620350<br><br>        <br><br>

不可侵犯 发表于 2025-3-21 22:26:25

http://reply.papertrans.cn/63/6204/620350/620350_2.png

overhaul 发表于 2025-3-22 00:36:27

http://reply.papertrans.cn/63/6204/620350/620350_3.png

北极熊 发表于 2025-3-22 04:49:33

http://reply.papertrans.cn/63/6204/620350/620350_4.png

绝种 发表于 2025-3-22 10:08:56

Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samplesdetection models in various scenarios. However, it often suffers from training data over-fitting. In this paper, we propose a supervised machine learning method for cyber-threat detection, which modifies the training set to reduce data over-fitting when training a deep neural network. This is done b

Externalize 发表于 2025-3-22 13:38:15

http://reply.papertrans.cn/63/6204/620350/620350_6.png

NOVA 发表于 2025-3-22 17:27:16

http://reply.papertrans.cn/63/6204/620350/620350_7.png

婴儿 发表于 2025-3-22 22:48:59

http://reply.papertrans.cn/63/6204/620350/620350_8.png

Expediency 发表于 2025-3-23 02:08:34

IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network the field of cybersecurity. Many researchers have already proposed several anti-phishing approaches to detect phishing in terms of email, webpages, images, or links. This study also aimed to propose and implement an intelligent framework to detect phishing URLs (Uniform Resource Locator). It has be

prostatitis 发表于 2025-3-23 07:18:11

http://reply.papertrans.cn/63/6204/620350/620350_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Machine Intelligence and Big Data Analytics for Cybersecurity Applications; Yassine Maleh,Mohammad Shojafar,Youssef Baddi Book 2021 The Ed