Читать книгу Intelligent Data Analytics for Terror Threat Prediction - Группа авторов - Страница 3

List of Tables

Оглавление

1 Chapter 1Table 1.1 Social network users [24].Table 1.2 Dataset features [31].

2 Chapter 5Table 5.1 Similarity score of keyword ‘Authentication’ in various Document ID.Table 5.2 Similarity score of keyword ‘SQL injection’ in various documents.Table 5.3 Accuracy for searching cyber-attack related keywords using hybrid appr...

3 Chapter 6Table 6.1 Topics in the dataset.Table 6.2 Events present in the topics.Table 6.3 Precision.Table 6.4 Sensitivity.Table 6.5 Specificity.Table 6.6 Accuracy.

4 Chapter 8Table 8.1 Features extracted from Wireshark.Table 8.2 Rules generated.Table 8.3 Error rate.

5 Chapter 9Table 9.1 The representation schemes along with matching algorithms for Biometri...Table 9.2 Comparisons of Biometric Identifiers on the basis of various factors [...Table 9.3 Examples of apps using biometric recognizance [39, 40].Table 9.4 Advantages & disadvantages of biometric system on the basis of various...

6 Chapter 10Table 10.1 Four forms of knowledge discovery in crime cases.Table 10.2 Comparison of methodology.

7 Chapter 12Table 12.1 Benefits & Snag of security schemes in WSN.

8 Chapter 14Table 14.1 Functionality of USB charging cable.

Intelligent Data Analytics for Terror Threat Prediction

Подняться наверх