Search Results for Data mining. - Narrowed by: Big data. - Data mining. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bmining.$0026qf$003dSUBJECT$002509Konu$002509Big$002bdata.$002509Big$002bdata.$0026qf$003dSUBJECT$002509Konu$002509Data$002bmining.$002509Data$002bmining.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300$0026isd$003dtrue?2024-08-05T21:57:10ZSmart Trends in Systems, Security and Sustainability Proceedings of WS4 2017ent://SD_ILS/0/SD_ILS:2229602024-08-05T21:57:10Z2024-08-05T21:57:10ZYazar Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Algorithms and Applications ALAP 2018ent://SD_ILS/0/SD_ILS:2220042024-08-05T21:57:10Z2024-08-05T21:57:10ZYazar Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:2220142024-08-05T21:57:10Z2024-08-05T21:57:10ZYazar Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>