Adaptations of data mining methodologies: A systematic literature review

V Plotnikova, M Dumas, F Milani - PeerJ Computer Science, 2020 - peerj.com
The use of end-to-end data mining methodologies such as CRISP-DM, KDD process, and
SEMMA has grown substantially over the past decade. However, little is known as to how …

Security related data mining

M Monshizadeh, Z Yan - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
Data mining is the process that extracts, classifies and analyzes valid and useful information
from large volumes of data provided by multiple sources. The data mining has been widely …

[PDF][PDF] Adaptations of Data Mining Methodologies

V Plotnikova, M Dumas, FP Milani - pdfs.semanticscholar.org
The availability of Big Data has stimulated widespread adoption of data mining and data
analytics in 28 research and in business settings (Columbus, 2017). Over the years certain …

Security in Mobile networks: A Novel challenge and Sollution

TQ Thanh, Y Rebahi… - chapter 18 of “Case …, 2014 - api.taylorfrancis.com
374◾ Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz academia, and industry.
We discuss the possibility of dealing with different attacks by investigating the Diameter …

Mobile Network Threat Analysis and MNO Positioning

G Lyberopoulos, H Theodoropoulou, K Filis - Information Sciences and …, 2013 - Springer
The dramatic increase of smart mobile devices and applications, the advent of Android OS,
the increased number of wireless radios (incl. NFC) the support and the low awareness …

Publications of M Zubair Rafique

DNRD Bites, DN Seminars - cs.kuleuven.be
Department of Computer Science search home imec-DistriNet Research Group, KU Leuven
Menu Login account_box About us keyboard_arrow_down Contact information How to …