Login / Signup
Application of Rank Correlation, Clustering and Classification in Information Security.
Gleb Beliakov
John Yearwood
Andrei V. Kelarev
Published in:
J. Networks (2012)
Keyphrases
</>
information security
correlation clustering
countermeasures
information systems
security issues
machine learning
feature selection
feature extraction
supervised learning
unsupervised learning
intrusion detection
case study
training set
pairwise
model selection
smart card