Access the full text.
Sign up today, get DeepDyve free for 14 days.
H.S. Vaccaro, G.E. Liepins (1989)
The 1989 IEEE Symposium on Security and Privacy
R. Agrawal, T. Imielinski, A. Swami (1993)
Proc. 1993 ACM SIGMOD International Conference on Management of Data (SIGMOD'93)
R.W. Ashby (1956)
An Introduction to Cybernetics
S. Bagchi, M.A. Barborak, D.W. Buchanan, J. ChuCarroll, D.A. Ferrucci, M.R. Glass, A. Kalyanpur, E.T. Mueller, J.W. Murdock, S. Patwardhan, J.M. Prager, C.A. Welty (2014)
WatsonPaths: ScenarioBased Question Answering and Inference over Unstructured Information (IBM Research Report RC25489)
V.A. Zakharov, E.V. Chemeritskii (2014)
Some problems of reconfiguration of software-configurable networksModel. Anal. Inf. Sist., 21
Yu.I. Zhuravlev (1977)
Correct algebras on sets of incorrect (heuristic) algorithmsKibernetika, 4
H.S. Teng, K. Chen, S.-Y. Lu (1990)
IEEE Symposium on Security and Privacy
R. Agrawal, R. Srikant (1994)
Proc. 20th Int. Conf. Very Large Data Bases (VLDB)
M.I. Zabezhailo (2014)
Some capabilities of enumeration control in the DSM methodSci. Tech. Inf. Process., 41
D.E. Denning (1986)
Proceedings of the Seventh IEEE Symposium on Security and Privacy
G.D. Plotkin (1971)
A further note on inductive generalizationMach. Intell., 6
V.A. Zakharov, R.L. Smelyanskii, E.V. Chemeritskii (2013)
The formal model and verification problems of software-configurable networksModel. Anal. Inf. Sist., 20
Yu.I. Zhuravlev, V.V. Ryazanov, O.V. Sen’ko (2006)
“Raspoznavanie”. Matematicheskie metody. Programmnaya sistema. Prakticheskie primeneniya
V.K. Finn (2011)
J.S. Mill’s inductive methods in artificial intelligence systemsSci. Tech. Inf. Process., 38
J. Pearl (2000)
Causality: Models, Reasoning, and Inference
K.V. Rudakov (1986)
Some universal restrictions for classification algorithmsZh. Vychisl. Mat. Mat. Fiz., 26
D. Carasso (2013)
Splunk
D. Clark (2015)
The Wall Street Journal
W.-D. Zhu, B. Foyle, D. Gagné, V. Gupta, J. Magdalen, I. A.S. Mund, T. Nasukawa, M. Paulis, J. Singer, M. Triska (2014)
IBM Watson Content Analytics: Discovering Actionable Insight from Your Content
G.D. Plotkin (1970)
A note on inductive generalizationMach. Intell., 5
P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, S. Whyte (2013)
Proc. 10th USENIX Symposium on Networked Systems Design and Implementation
D. Tkach (1998)
Text Mining Technology: Turning Information into Knowledge
Yu. Voronina (2015)
Ross. Gaz.
D.E. Aleksandrov (2014)
Effective methods for checking the content of network packets by regular expressionsIntell. Sist., 18
An overview of several applications of techniques and models of data mining (DM) in applied information security systems is presented. Special focus is put on the new and actively developed area of cloud-based computing environments. Both the available and future applicabilities of models and techniques of artificial intelligence to IS problem solving are discussed.
Automatic Documentation and Mathematical Linguistics – Springer Journals
Published: Feb 5, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.