Identifying individual vulnerability based on public data.
John FerroLisa SinghMicah SherrPublished in: PST (2013)
Keyphrases
- data sets
- data processing
- data collection
- original data
- training data
- raw data
- complex data
- data analysis
- sensor data
- historical data
- multimedia data
- statistical analysis
- image data
- data points
- probability distribution
- prior knowledge
- data structure
- high quality
- similarity measure
- data mining techniques
- knowledge discovery
- synthetic data
- spatial data
- application domains
- experimental data
- statistical methods
- case study
- neural network