News
Intrusion detection systems are used for this purpose. We have used a few of the Machine Learning (ML) procedures such as Support vector Machine (SVM), Decision Tree (DT), Logistic regression (LR), ...
Abstract: This installment of Computer's series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Pattern Analysis and Machine Intelligence.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results