Network Vulnerability Analysis Using Text Mining.
Chungang LiuJianhua LiXiuzhen ChenPublished in: ACIIDS (2) (2012)
Keyphrases
- text mining
- network traffic
- network model
- peer to peer
- textual documents
- communication networks
- information extraction
- wireless sensor networks
- information systems
- network structure
- real world
- artificial neural networks
- search engine
- data sets
- artificial intelligence
- computer networks
- genetic algorithm
- data mining
- network architecture
- data flow
- network design
- heterogeneous networks