Читать книгу Intelligent Data Analytics for Terror Threat Prediction - Группа авторов - Страница 3
List of Tables
Оглавление1 Chapter 1Table 1.1 Social network users [24].Table 1.2 Dataset features [31].
2 Chapter 5Table 5.1 Similarity score of keyword ‘Authentication’ in various Document ID.Table 5.2 Similarity score of keyword ‘SQL injection’ in various documents.Table 5.3 Accuracy for searching cyber-attack related keywords using hybrid appr...
3 Chapter 6Table 6.1 Topics in the dataset.Table 6.2 Events present in the topics.Table 6.3 Precision.Table 6.4 Sensitivity.Table 6.5 Specificity.Table 6.6 Accuracy.
4 Chapter 8Table 8.1 Features extracted from Wireshark.Table 8.2 Rules generated.Table 8.3 Error rate.
5 Chapter 9Table 9.1 The representation schemes along with matching algorithms for Biometri...Table 9.2 Comparisons of Biometric Identifiers on the basis of various factors [...Table 9.3 Examples of apps using biometric recognizance [39, 40].Table 9.4 Advantages & disadvantages of biometric system on the basis of various...
6 Chapter 10Table 10.1 Four forms of knowledge discovery in crime cases.Table 10.2 Comparison of methodology.
7 Chapter 12Table 12.1 Benefits & Snag of security schemes in WSN.
8 Chapter 14Table 14.1 Functionality of USB charging cable.