X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
data mining (7) 7
classification (6) 6
computer science, artificial intelligence (5) 5
algorithms (4) 4
machine learning (4) 4
optimization (4) 4
algorithm (3) 3
analysis (3) 3
anomaly detection (3) 3
detection system (3) 3
feature-selection (3) 3
intrusion detection (3) 3
social networks (3) 3
support vector machine (3) 3
classifiers (2) 2
computer information security (2) 2
computer science, information systems (2) 2
engineering, electrical & electronic (2) 2
information science (2) 2
intrusion (2) 2
operations research & management science (2) 2
parameter setting (2) 2
particle swarm optimization (2) 2
ramp loss function (2) 2
research (2) 2
security software (2) 2
admm (1) 1
alternating direction method of multipliers (1) 1
analytic hierarchy process (1) 1
analytics (1) 1
apriori association rule (1) 1
automation & control systems (1) 1
bank industry (1) 1
beschleunigung (1) 1
big data (1) 1
blockchain (1) 1
centrality measures (1) 1
chaos theory (1) 1
cloud (1) 1
community structure (1) 1
competitive advantage (1) 1
complexity (1) 1
computational geometry (1) 1
computer networks (1) 1
computer science, software engineering (1) 1
computer science, theory & methods (1) 1
computer security (1) 1
computer simulation (1) 1
computer-netzwerk (1) 1
concave-convex procedure (1) 1
concave–convex procedure (1) 1
consensus algorithms (1) 1
content mining (1) 1
convex analysis (1) 1
convexity (1) 1
data envelopment analysis (1) 1
data processing (1) 1
data security (1) 1
datasets (1) 1
dateneinhüllanalyse (1) 1
deep learning (1) 1
deep learning - trends (1) 1
destructive leadership (1) 1
diebstahlsicherung (1) 1
diffusion (1) 1
disease characteristics (1) 1
diseases (1) 1
distance (1) 1
domains (1) 1
drug development (1) 1
drug development - trends (1) 1
drugs (1) 1
e-banking; artificial neural networks; association rule; self-organizing map (1) 1
eindringentdeckung (1) 1
embedding problem (1) 1
ensemble (1) 1
entropie (1) 1
entropy (1) 1
entscheidungsfindung (1) 1
evolution (1) 1
extreme values (1) 1
feature recognition (1) 1
feature selection (1) 1
feature selection algorithm (1) 1
flow of influence (1) 1
fuzzy functional (1) 1
fuzzy numbers (1) 1
fuzzy structured element (1) 1
genetics (1) 1
gewichtung (1) 1
graph matching (1) 1
graph mining (1) 1
graph percolation (1) 1
graph structure learning (1) 1
graphs (1) 1
heredity (1) 1
homeomorphism (1) 1
humans (1) 1
identification (1) 1
identifying influential nodes (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Expert Systems With Applications, ISSN 0957-4174, 01/2019, Volume 115, pp. 200 - 222
Journal Article
Neurocomputing, ISSN 0925-2312, 10/2018, Volume 310, pp. 223 - 235
•A robust and Sparse approach for anomaly detection is proposed.•The proposed algorithm is based on Ramp loss One-class SVM.•The CCCP procedure is used to... 
One-class SVM | Ramp loss function | Non-convex problem | Anomaly detection | INTRUSION DETECTION | ALGORITHM | CLASSIFICATION | NETWORKS | DETECTION SYSTEM | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | CLASSIFIERS | FEATURE-SELECTION | OPTIMIZATION | Data mining | Analysis | Algorithms
Journal Article
International Journal of Enterprise Information Systems, ISSN 1548-1115, 10/2015, Volume 11, Issue 4, pp. 63 - 78
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2014, Volume 31, pp. 632 - 638
Data mining is a one of the growing sciences in the world that can play a competitive advantages rule in many firms. Data mining algorithms based on their... 
Feature Selection Algorithm | Entropy | Data mining | Classification | Data Envelopment Analysis | Feature selection algorithm | Data envelopment analysis
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 55, pp. 231 - 237
Intrusion detection system (IDS) is an inseparable part of each computer networks to monitor the events and attacks, which many researchers proposed variety of... 
Multiple criteria linear programming | Data Mining | Network Intrusion detection | Particle swarm optimization | Classification | Data mining | Network intrusion detection
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2016, Volume 91, pp. 482 - 491
Support vector machine is a well-known and computationally powerful machine learning technique for pattern classification and regression problems, which has... 
Parameter setting | Twin SVM | Nonparallel Support Vector Machine | Particle Swarm Optimization
Journal Article
International Journal of Computers, Communications and Control, ISSN 1841-9836, 2015, Volume 10, Issue 6, pp. 889 - 903
In this paper, based on the fuzzy structured element, we prove that there is a bijection function between the fuzzy number space epsilon(1) and the space B[-1,... 
Fuzzy structured element | Fuzzy functional | Fuzzy numbers | Homeomorphism | Standard monotonic bounded functions | standard monotonic bounded functions | fuzzy functional | homeomorphism | fuzzy numbers | SETS | fuzzy structured element | COMPUTER SCIENCE, INFORMATION SYSTEMS | EMBEDDING PROBLEM | AUTOMATION & CONTROL SYSTEMS
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2017, Volume 108, pp. 1261 - 1270
Large-scale linear classification is widely used in many areas. Although SVM-based models for ordinal regression problem are proven to be powerful techniques,... 
ADMM | Ordinal Regression | Support Vector Machine
Journal Article
Expert Systems With Applications, ISSN 0957-4174, 09/2020, Volume 154, p. 113385
•A comprehensive review of the state-of-the-art blockchain consensus algorithms.•An analytical framework to evaluate the pros and cons of consensus... 
Trust and permission models | Security vulnerability | Blockchain | Consensus algorithms | Performance evaluation criteria | NETWORK | MANAGEMENT | CLOUD | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | ENGINEERING, ELECTRICAL & ELECTRONIC | SCHEME | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | EVOLUTION | SECURITY | TECHNOLOGY
Journal Article
Management science letters, ISSN 1923-9335, 07/2011, Volume 1, Issue 3, pp. 253 - 262
One of the most important objectives of any modern organization is to gain competitive advantage of customers' data. In order to find hidden patterns or models... 
Bank Industry | Apriori association rule | Service marketing | Self-organizing map
Journal Article
Expert systems with applications, ISSN 0957-4174, 01/2019, Volume 115, p. 200
A social network as an essential communication platform facilitates the interactions of online users. Based on the interactions, users can influence or be... 
Opinions | Social networks | Statistical methods | Product development | Users | Topology | Data mining | Analytics
Journal Article
FRONTIERS OF COMPUTER SCIENCE, ISSN 2095-2228, 04/2020, Volume 14, Issue 6
Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user... 
MAXIMUM-LIKELIHOOD | DISTANCE | graph structure learning | user identity linkage | social networks | ALGORITHM | COMPUTER SCIENCE, INFORMATION SYSTEMS | graph percolation | maximum subgraph matching | SUBGRAPH | GRAPHS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Knowledge-based systems, ISSN 0950-7051, 06/2017, Volume 126, p. 113
Network intrusion detection problem is an ongoing challenging research area because of a huge number of traffic volumes, extremely imbalanced data sets,... 
Intrusion | Network security | Skewed distributions | Optimization | Training | Datasets | Computational geometry | Robustness (mathematics) | Outliers (statistics) | Classification | Computer networks | Convexity | Computer security | Convex analysis | Intrusion detection systems | Extreme values
Journal Article
Muṭāli̒āt-i Mudīriyyat-i Ṣan̒atī, ISSN 2251-8029, 01/2012, Volume 9, Issue 23, pp. 187 - 207
During the past two decades, perspective of competition in the banking industry has been changed significantly. This is due to forces such as new laws,... 
E-Banking; artificial neural networks; association rule; self-organizing map
Journal Article
06/2018, ISBN 9781522558293, 31
Technological advancements have become an integral part of life, impacting the way we work, communicate, make decisions, learn, and play. As technology... 
LCSH: Information resources management. | Information services. | Information Resources Management | Library & Information Science | Knowledge Management
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.