Combining the big data analysis and the threat intelligence technologies for the classified protection model.
Yuan TaoYu-xiang ZhangSiyuan MaKe FanMo-yan LiFengming GuoZheng XuPublished in: Clust. Comput. (2017)
Keyphrases
- computational model
- data analysis
- probability distribution
- simulation model
- computational models
- experimental data
- prior knowledge
- similarity measure
- high level
- artificial intelligence
- data mining
- management system
- intrusion detection
- image segmentation
- theoretical framework
- statistical model
- big data
- learning algorithm
- genetic algorithm