- danziyouzhendong 单自由度振动系统--基于MATLAB建模仿真
- SheepLogan.rar 用于练习CT重建算法的MATLAB程序
- MFCDll MFC dll 示例 以及动态和静态调用示例
- freefall_demonstration This is a complete visual studio project with exe file. It focuses on OpenGl. It simulates freefall of an egg and a ball bouncing inside a cube. To switch press "a
- tp3_program 求仿真OFDM系统的性能
- Rabin-2002---AI-Game-Programming-Wisdom Learn how AI experts create intelligent game objects and characters with this first volume in the AI Game Programming Wisdom series. This unique collection of articles gives programmers and developers access to the insights and wisdom of over thirty AI pros. Each article delves deep into key AI game programming issues and provides insightful new ideas and techniques that can be easily integrated into your own games. Everything general AI architectures
文件名称:UsingDataMiningTechniquesforDetectingTerrorRelate
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:211.9kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used
by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The
Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a commandbased
intrusion detection system
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used
by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The
Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a commandbased
intrusion detection system
(系统自动生成,下载前可以参看下载内容)
下载文件列表
Using Data Mining Techniques for Detecting Terror-Related
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
