Login / Signup
Multi Layer Monitoring Function on Unauthorized Network Access Analysis Method.
Naoyuki Fujita
Published in:
ISAS-SCI (1) (2001)
Keyphrases
</>
multi layer
learning algorithm
neural nets
neural network
feed forward neural networks
databases
data mining
machine learning