Author:
Gunavathi C.,Swarna Priya R. M.,Aarthy S. L.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper;Cybernetics and Information Technologies;2023-09-01
2. Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12
3. Efficient anomaly detection using deer hunting optimization algorithm via adaptive deep belief neural network in mobile network;Journal of Ambient Intelligence and Humanized Computing;2022-05-16
4. Fraud Detection Call Detail Record Using Machine Learning in Telecommunications Company;Advances in Science, Technology and Engineering Systems Journal;2020-07
5. Modeling and state of health estimation of nickel–metal hydride battery using an EPSO-based fuzzy c-regression model;Soft Computing;2019-09-14