Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Abu-Aisheh Z, Raveaux R, Ramel JY (2020) Efficient k-nearest neighbors search in graph space. Pattern Recognit Lett 134:77–86
2. Angel D (2022) Application of graph domination to defend medical information networks against cyber threats. J Ambient Intell Humaniz Comput 13:3765–3770
3. Anikin IV (2017) Using fuzzy logic for vulnerability assessment in telecommunication network. In: International conference on industrial engineering, applications and manufacturing (ICIEAM)
4. Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176
5. Chen H, Chillotti I, Dong Y, Poburinnaya O, Razenshteyn I, Riazi MS (2020) SANNS: scaling up secure approximate k-nearest neighbors search. In: Proceedings of the 29th USENIX security symposium, 2020, pp 2111–2128
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献