CSpace

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
An Intelligent Secure Fault Classification and Identification Scheme for Mining Valuable Information in IIoT 期刊论文
IEEE SYSTEMS JOURNAL, 2024, 页码: 12
作者:  Zhang, Ying;  Zhang, Wenyuan;  Jiang, Xiaoyu;  Sun, Yuzhong;  Feng, Baiming;  Xiong, Naixue;  Wo, Tianyu
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Industrial Internet of Things  Vectors  Pattern matching  Fault diagnosis  Fault detection  Feature extraction  Source coding  Abnormal detection  Industrial Internet of Things (IIoT)  log mining  security  S-Kmeans  
A dependence graph pattern mining method for processor performance analysis 期刊论文
PERFORMANCE EVALUATION, 2024, 卷号: 164, 页码: 20
作者:  Zheng, Yawen;  Han, Chenji;  Zhang, Tingting;  Zhang, Fuxin;  Wang, Jian
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Performance analysis  Critical path analysis  Micro-execution dependence graph  Sequential pattern mining  High average utility  
EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 卷号: 115, 页码: 236-250
作者:  Feng, Wenjie;  Liu, Shenghua;  Faloutsos, Christos;  Hooi, Bryan;  Shen, Huawei;  Cheng, Xueqi
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Pattern recognition  Large graph mining  Micro-clusters  Anomaly detection  Histogram  
Mining concise patterns on graph-connected itemsets 期刊论文
NEUROCOMPUTING, 2019, 卷号: 336, 页码: 27-35
作者:  Zhang, Di;  Zhang, Yunquan;  Niu, Qiang;  Qiu, Xingbao
收藏  |  浏览/下载:79/0  |  提交时间:2019/08/16
Pattern mining  MDL  Graph  Diffusion kernel  Maximal entropy random walk  
An approach for adaptive associative classification 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 卷号: 38, 期号: 9, 页码: 11873-11883
作者:  Wang, Xiaofeng;  Yue, Kun;  Niu, WenJia;  Shi, Zhongzhi
收藏  |  浏览/下载:80/0  |  提交时间:2019/12/16
Associative classification  Frequent pattern mining  Co-training  Emerging frequent pattern  Maximum entropy model  
Detecting network intrusions by data mining and variable-length sequence pattern matching 期刊论文
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 卷号: 20, 期号: 2, 页码: 405-411
作者:  Tian Xinguang;  Duan Miyi;  Sun Chunlai;  Liu Xin
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/16
intrusion detection  anomaly detection  system call  data mining  variable-length pattern  
An exact data mining method for finding center strings and all their instances 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 卷号: 19, 期号: 4, 页码: 509-522
作者:  Lu, Ruqian;  Jia, Caiyan;  Zhang, Shaofang;  Chen, Lusheng;  Zhang, Hongyu
收藏  |  浏览/下载:43/0  |  提交时间:2019/12/16
data mining  frequent pattern  common approximate substring  center string  Bpriori algorithm