Sign in

An Action-based Model to Handle Cloning and Adaptation in Tabular Data Applications.

Nassim BounouasMireille Blay-FornarinoPhilippe Collet
Published in: SPLC (A) (2023)
Keyphrases
  • probabilistic model
  • intrusion detection