Dhanaraj et al., 2021
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Dhanaraj et al. | Random forest bagging and x‐means clustered antipattern detection from SQL query log for accessing secure mobile data | |
| Wei et al. | Deephunter: A graph neural network based approach for robust cyber threat hunting | |
| Khan et al. | Big data: survey, technologies, opportunities, and challenges | |
| Jia et al. | Node attribute-enhanced community detection in complex networks | |
| Vangipuram et al. | A machine learning approach for imputation and anomaly detection in IoT environment | |
| Leydesdorff | Betweenness centrality as an indicator of the interdisciplinarity of scientific journals | |
| Liu et al. | An Improved Apriori Algorithm Based on an Evolution‐Communication Tissue‐Like P System with Promoters and Inhibitors | |
| Zhang et al. | EX‐Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning | |
| Hsu et al. | Integrating machine learning and open data into social Chatbot for filtering information rumor | |
| Deng et al. | Exploring and inferring user–user pseudo‐friendship for sentiment analysis with heterogeneous networks | |
| Bucur | Top influencers can be identified universally by combining classical centralities | |
| Vieira et al. | Performance evaluation of modularity based community detection algorithms in large scale networks | |
| Chen et al. | Empirical studies on the impact of filter‐based ranking feature selection on security vulnerability prediction | |
| Gera et al. | T-Bot: AI-based social media bot detection model for trend-centric twitter network | |
| Lota et al. | A systematic literature review on sms spam detection techniques | |
| Soni et al. | Follow the leader: Documents on the leading edge of semantic change get more citations | |
| Bianchi et al. | Actively learning to rank semantic associations for personalized contextual exploration of knowledge graphs | |
| Du et al. | ExpSeeker: Extract public exploit code information from social media | |
| Cousseau et al. | Linking place records using multi-view encoders | |
| Takko et al. | Knowledge mining of unstructured information: application to cyber domain | |
| Chao et al. | Network Embedding‐Based Approach for Detecting Collusive Spamming Groups on E‐Commerce Platforms | |
| Widyasari et al. | Topic Recommendation for GitHub Repositories: How Far Can Extreme Multi-Label Learning Go? | |
| Aljanabi et al. | Distributed denial of service attack defense system-based auto machine learning algorithm | |
| Wang et al. | An improved clustering method for detection system of public security events based on genetic algorithm and semisupervised learning | |
| Xu et al. | Two new types of multiple granulation rough set |