Author:
Lanciano Giacomo,Ritacco Antonio,Brau Fabio,Cucinotta Tommaso,Vannucci Marco,Artale Antonino,Barata Joao,Sposato Enrica
Publisher
Springer International Publishing
Reference36 articles.
1. Van den Berg, F.D., et al.: Product uniformity control-a research collaboration of European steel industries to non-destructive evaluation of microstructure and mechanical properties. In: Electromagnetic Non-Destructive Evaluation (XXI), 6 September 2017 through 8 September 2017, pp. 120–129 (2018)
2. Bertero, C., Roy, M., Sauvanaud, C., Tredan, G.: Experience report: log mining using natural language processing and application to anomaly detection. In: 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE), pp. 351–360. IEEE, October 2017
3. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153–1176 (2015)
4. Canetta, L., Cheikhrouhou, N., Glardon, R.: Applying two-stage SOM-based clustering approaches to industrial data analysis. Prod. Plann. Control 16(8), 774–784 (2005)
5. Chen, D.R., Chang, R.F., Huang, Y.L.: Breast cancer diagnosis using self-organizing map for sonography. Ultrasound Med. Biol. 26(3), 405–411 (2000)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy, and Future Directions;IEEE Internet of Things Journal;2024-06-01
2. Near Real-Time Anomaly Detection in NFV Infrastructures;2022 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN);2022-11-14