Loading…
Loading…
Loading…
The Inadequacy of Entropy-Based Ransomware Detection
McIntosh, Timothy, Jang-Jaccard, Julian, Watters, Paul, Susnjak, Teo
Published in Neural Information Processing (2019)
Published in Neural Information Processing (2019)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Firefly Algorithm for Demand Estimation of Water Resources
Wang, Hui, Cui, Zhihua, Wang, Wenjun, Zhou, Xinyu, Zhao, Jia, Lv, Li, Sun, Hui
Published in Neural Information Processing (2017)
Published in Neural Information Processing (2017)
Get full text
Book Chapter
Loading…
Loading…
Evaluating Accuracy in Prudence Analysis for Cyber Security
Maruatona, Omaru, Vamplew, Peter, Dazeley, Richard, Watters, Paul A.
Published in Neural Information Processing (2017)
Published in Neural Information Processing (2017)
Get full text
Book Chapter
Loading…
Loading…
A Tag-Based Integrated Diffusion Model for Personalized Location Recommendation
Zheng, Yaolin, Wang, Yulong, Zhang, Lei, Wang, Jingyu, Qi, Qi
Published in Neural Information Processing (2017)
Published in Neural Information Processing (2017)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
A Neural Networks Committee for the Contextual Bandit Problem
Allesiardo, Robin, Féraud, Raphaël, Bouneffouf, Djallel
Published in Neural Information Processing (2014)
Published in Neural Information Processing (2014)
Get full text
Book Chapter
Loading…
Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification
Miyamoto, Daisuke, Blanc, Gregory, Kadobayashi, Youki
Published in Neural Information Processing (01.01.2015)
Published in Neural Information Processing (01.01.2015)
Get full text
Book Chapter