A close look at a systematic method for analyzing sets of security advice.
David BarreraChristopher BellmanPaul C. van OorschotPublished in: J. Cybersecur. (2023)
Keyphrases
- experimental evaluation
- detection method
- high accuracy
- high precision
- segmentation method
- cost function
- data sets
- optimization method
- feature extraction
- synthetic data
- support vector machine
- computationally efficient
- support vector machine svm
- candidate set
- clustering method
- detection algorithm
- access control
- dynamic programming
- significant improvement
- objective function
- similarity measure
- decision trees
- neural network