Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Achmad Eriza Aminanto"'
Autor:
Muhamad Erza Aminanto, R. Satrio Hariomurti Wicaksono, Achmad Eriza Aminanto, Harry Chandra Tanuwidjaja, Lin Yola, Kwangjo Kim
Publikováno v:
IEEE Access, Vol 10, Pp 36791-36801 (2022)
The rise of interconnected devices through wireless networks provides two sides consequences. On one side, it helps many human tasks; on the other hand, the prone wireless medium opens the vulnerable system to be exploited by adversaries. An Intrusio
Externí odkaz:
https://doaj.org/article/1a66d052065f478280b7ce65ab620bc2
Publikováno v:
Austrian Journal of Statistics, Vol 50, Iss 5 (2021)
Unlike other typical clustering analysis, which considers column only, biclustering analysis processes a matrix into sub-matrices based on rows and columns simultaneously. One method of bicluster analysis uses the probabilistic model, like the plaid
Externí odkaz:
https://doaj.org/article/398ad9741b3c4b6d80cf89d48edfbef4
Publikováno v:
Austrian Journal of Statistics, Vol 50, Iss 5 (2021)
Unlike other typical clustering analysis, which considers column only, biclustering analysis processes a matrix into sub-matrices based on rows and columns simultaneously. One method of bicluster analysis uses the probabilistic model, like the plaid
Publikováno v:
Lecture Notes in Civil Engineering ISBN: 9789811623288
Recently, the number of devices that are connected to the Internet are increasing exponentially due to the rise of the Internet of Things (IoT) era. Despite many advancements of the IoT era, we have been exposed to cyber security threats. Moreover, i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a27dda7e430789945ad4c90c17a67e5c
https://doi.org/10.1007/978-981-16-2329-5_14
https://doi.org/10.1007/978-981-16-2329-5_14