[HTML][HTML] Data Mining from a Statistical Perspective

JH Maindonald - Statistics Consulting Unit, 1999 - blogjava.net
… The intruders will have honed their methods, effectively changing the target population, by
the time that we come to use the discriminant function. We might choose the training set to be …

[PDF][PDF] Genomic surveillance

E Dirks, J Leibold - Australian Strategic Policy Institute, June, 2020 - cms2.dijitalhafiza.com
Forensic DNA analysis has been a part of criminal investigations for more than three
decades. Dozens of countries have searchable DNA databases that allow police to compare …

[PDF][PDF] The Neolithic and Austronesian expansion within island Southeast Asia and into the Pacific

M Spriggs, S Chiu, C Sand - From Southeast Asia to the Pacific …, 2007 - researchgate.net
… To compare the pattern of Neolithic expansion with that of the linguistic sequence we will
look first at the Philippines, northeastern Borneo (Sabah), Sulawesi, the Lesser Sunda Islands, …

[PDF][PDF] From Southeast Asia to the Pacific: Historical and Theoretical background to Austronesian Origins and to the Lapita dispersal in Western Oceania

S Chiu, C Sand - From Southeast Asia to the Pacific …, 2007 - researchgate.net
… As Kirch and Green put it, those who prefer this model call attention to “historical sequences
of cultural differentiation or divergence within related groups, regardless of the mechanism …

[PDF][PDF] An ideal of Hilbert algebras in BCK-algebras

QN Zhang, D LI, W CHEN, A YANG… - Proceedings of 2009 …, 2009 - file.scirp.org
In [3], it indicated that every Hilbert Algebras is anti-positive implicative BCK-algebras.
Therefore, in this article, we give an ideal of Hilbert Algebras in BCK-algebras, as well as some …

[PDF][PDF] Examing the potential and short comings of digital applications in Cultural Heritage

M Economou - The Proceedings of DACH, 2007 - academia.edu
Nowadays new technologies are being used by an increasing number of museums and
cultural organisations to support communication with the public and to make the experience of …

[引用][C] Adaptive Web Intrusion Detection Based on Immune and Fuzzy Logic

J WANG, D ZHANG, X SHI, X LAI - Mind and Computation, 2002

[HTML][HTML] 入侵偵測系統: 使用以函數為基礎的系統呼叫序列

C Tseng - 2008 - ir.lib.ncu.edu.tw
intrusion detection, which detect abnormal behaviors of a process using function-based
sequences of system calls… The method is especially effective in detecting Buffer Overflow Attacks. …

入侵偵測系統: 使用以函數為基礎的系統呼叫序列

曾俊翰 - 2008 - airitilibrary.com
… for years, modern computer systems suffered from these kinds of … intrusion detection,
which detect abnormal behaviors of a process using function-based sequences of system calls

以系統呼叫為基礎改良式迴圈簡化演算法之異常入侵偵測系統理論與實作

JH Chiou - 2006 - ir.lib.ncu.edu.tw
Using misuse intrusion detection technology can detect attacks effectively, however, it cannot
detect … improve the declined effectiveness caused by system call interception. Therefore, in …