## Abstract Information security technology is an essential component for protecting public and private computing infrastructures. With the widespread utilization of information technology applications, organizations are becoming more aware of the security threats to their resources. No matter how
โฆ LIBER โฆ
Data Mining Applications in E-Government Information Security
โ Scribed by Tongwei yuan; Peng Chen
- Book ID
- 119356148
- Publisher
- Elsevier
- Year
- 2012
- Tongue
- English
- Weight
- 299 KB
- Volume
- 29
- Category
- Article
- ISSN
- 1877-7058
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Data mining techniques for information s
โ
Amany Al-Shawi
๐
Article
๐
2011
๐
Wiley (John Wiley & Sons)
๐
English
โ 339 KB
[Advances in Information Security] Data
โ
Singhal, Anoop
๐
Article
๐
2007
๐
Springer US
โ 400 KB
Determining Key Factors in E-Government
โ
Smith, Stephen; Jamieson, Rodger
๐
Article
๐
2006
๐
Taylor and Francis Group
๐
English
โ 367 KB
Guest editorial: Special issue on data m
โ
Elovici, Yuval; Rokach, Lior; Albayrak, Sahin
๐
Article
๐
2013
๐
Elsevier Science
๐
English
โ 132 KB
Data mining applications in BT
โ
R. Shortland; R. Scarfe
๐
Article
๐
2007
๐
Springer
๐
English
โ 149 KB
Machine Learning and Data Mining for Com
โ
Marcus A. Maloof
๐
Library
๐
2005
๐
Springer
๐
English
โ 3 MB
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer sec