Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques
Author:
Funder
Agency for Defense Development
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Link
http://link.springer.com/article/10.1007/s00500-018-3433-1/fulltext.html
Reference27 articles.
1. Ade R, Deshmukh P (2013) Methods for incremental learning: a survey. Int J Data Min Knowl Manag Process 3(4):119–125. https://doi.org/10.5121/ijdkp.2013.3408
2. Bifet A, Holmes G, Pfahringer B, Kirkby R, Gavaldà R (2009) New Ensemble Methods For Evolving Data Streams. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, Paris, (pp 139–148). https://doi.org/10.1145/1557019.1557041
3. Chantrapornchai C, Nusawat P (2016) Two machine learning models for mobile phone battery discharge rate prediction based on usage patterns. J Inf Process Syst 12(3):436–454. https://doi.org/10.3745/JIPS.03.0048
4. Chizek J, Elsea J, Best R, Bolkcom C (2003) Military Transformation: Intelligence, Surveillance and Reconnaissance. Nova Science Publishers, New york
5. Domingos P Hulten G (2000) Mining high-speed data streams. In: Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, Boston, pp 71–80. https://doi.org/10.1145/347090.347107
Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical infrastructures;Internet of Things;2024-02
2. A Collaborative UAV Routing Algorithm for Time Sensitive Surveillance Tasks;2023 International Conference on Information Networking (ICOIN);2023-01-11
3. Military Applications of Machine Learning: A Bibliometric Perspective;Mathematics;2022-04-22
4. Unsupervised online anomaly detection in Software Defined Network environments;Expert Systems with Applications;2022-04
5. Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data;2021 IEEE International Conference on Intelligence and Security Informatics (ISI);2021-11-02
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3