Author:
Ismael Sahib Hussein,Qahatan AlSudani Mustafa,Hasan Ali Mohammed,Qassim Abbas Haydar,Moorthy Kohbalan,Mundher Adnan Myasar
Funder
Universiti Malaysia Pahang
Reference35 articles.
1. Rosten, Edward, and Tom Drummond. 2006. “Machine Learning for High-Speed Corner Detection.” : 1–14.
2. An Extreme Learning Machine Model for the Simulation of Monthly Mean Streamflow Water Level in Eastern Queensland;Deo;Environmental Monitoring and Assessment,2016
3. Maggi, Federico, Stefano Zanero, and Vincenzo Iozzo. 2008a. “Seeing the Invisible: Forensic Uses of Anomaly Detection and Machine Learning.” Operating Systems Review of the ACM Special Interest Group on Operating Systems (SIGOPS) 42(3): 51–58. http://dl.acm.org/citation.cfm?id=1368514.
4. Multimedia in Forensics, Security, and Intelligence;Battiato;IEEE Multimedia,2012
5. Expert Systems with Applications A Network Intrusion Detection System Based on a Hidden Naïve Bayes Multiclass Classifier;Koc;Expert Systems With Applications,2012
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献