2021
DOI: 10.1007/978-3-030-77445-5_63
|View full text |Cite
|
Sign up to set email alerts
|

Conceptual Approach to Implementation of Adaptive Protection of Operational Cybersecurity Centers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…On the other hand, the reasoning is used to obtain knowledge that has multiple sources and multiple attributes. A popular area of study is the KR approach as represented by Bayesian networks [14]. Numerous documents have surfaced, and further research is important.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the reasoning is used to obtain knowledge that has multiple sources and multiple attributes. A popular area of study is the KR approach as represented by Bayesian networks [14]. Numerous documents have surfaced, and further research is important.…”
Section: Introductionmentioning
confidence: 99%
“…To address this challenge, the pattern recognition (PR) method was developed. With its significant capacity for learning, the PR has been educated to use historical data or practice samples to mine the situation mode division's knowledge methodically and scientifically since 2005 [14,15]. The majority of the already used evaluation techniques will essentially introduce data mining, which also illustrates the tendency of a thorough application of numerous techniques the examination of the idea that "problems appear to solve issues" is embodied in the creation of evaluation methodologies.…”
Section: Introductionmentioning
confidence: 99%