Back to Results
First PageMeta Content
Data mining / Formal sciences / Computer network security / Multivariate statistics / Weka / Client honeypot / Honeypot / Text mining / Machine learning / Statistics / Science / Data analysis


Security Analytics Project: Alternatives in Analysis Mark Ryan del Moral Talabis Secure-DNA Contents I.
Add to Reading List

Document Date: 2014-12-16 19:06:37


Open Document

File Size: 782,36 KB

Share Result on Facebook

Company

Bell Laboratories / AT&T / Lucent Technologies / Microsoft / /

Facility

Port Attacks / /

IndustryTerm

security data collection tools / command-line tool / machine learning algorithms / Text mining / classification tree induction algorithm / data mining methods / web browsers / statistical computing / web browser / data mining / Internet Attack Patterns using Honeynet Data / data pre-processing / mining / Web-Attacks / software clients / Internet Attack Patterns using Honeynet Data Using Principal Component Analysis / data mining tasks / Possible applications / open source tools / free data mining software / learning algorithms / /

OperatingSystem

GNU / /

Person

John Chambers / /

ProgrammingLanguage

Java / /

Technology

classification tree induction algorithm / machine learning algorithms / bioinformatics / artificial intelligence / Java / data mining / machine learning / /

URL

http /

SocialTag