Author:
Swamy T. M. Veeragangadhara,Vani N.
Reference19 articles.
1. Duong, H., Truong, T., & Tran, A. (2019.) Fast generation of sequential pattern with item constraints from concise representation. Springer Open. Journal of Big Data. https://doi.org/10.1186/s40537-019-0200-9
2. Doddegowda, B. J., Raju, G. T., & Manvi, S. K. S. (2016, May 20–21). Extraction of behavioral patterns from preprocessed web usage data for web personalization. In IEEE ınternational conference on recent trends ın electronics ınformation communication technology.
3. Parikh, M., Chaudhari, B., & Chand, C. (2013). A comparative study of sequential pattern mining algorithms. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(2). ISSN 2319 – 4847.
4. Reshamwala, A., & Mahajan, S. (2012, October). Prediction of DoS attack sequences. In International conference on communication, ınformation and computing technology (ICCICT-2012) (pp. 18–20). Mumbai.
5. Slimani, T., & Lazzez, A. (2013). Sequentıal mining: Patterns and algorıthms analysıs. International Journal of Computer and Electronics Research, 2(5).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automatic Generation Model of Host Micro- Segmentation in Distribution Master Station Based on Distributed Intrusion Detection;2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI);2022-09-23