Author:
Zavaleta-Sánchez Esteban,Domínguez-Sánchez Gabriel,Loeza-Mejía Cecilia-Irene,Sánchez-DelaCruz Eddy
Publisher
Springer Nature Singapore
Reference34 articles.
1. Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. In: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pp 60–69
2. Alcácer, V, Cruz-Machado V (2019) Scanning the industry 4.0: a literature review on technologies for manufacturing systems. Eng Sci Technol Int J 22(3):899–919
3. Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, pp 420–424
4. Anderson C, Gantz JF (2013) White paper skills requirements for tomorrow’s best jobs helping educators provide students with skills and tools they need. International Data Corporation
5. Azevedo A, Santos MF (2008) KDD, semma and CRISP-DM: a parallel overview. IADS-DM