Login / Signup
Designing a vulnerability threat detection scanner with the use of machine learning models.
Olga Ussatova
Vladislav Karyukin
Aidana Zhumabekova
Yenlik Begimbayeva
Nikita Ussatov
Published in:
IAIT (2023)
Keyphrases
</>
machine learning models
spam filtering
machine learning algorithms
machine learning approaches
learning models
machine learning
image classification
data sets
learning algorithm
feature selection
training data
higher order
markov random field