Essays about: "Community Detection"
Showing result 6 - 10 of 85 essays containing the words Community Detection.
-
6. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
7. Constructing and representing a knowledge graph(KG) for Positive Energy Districts (PEDs)
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : In recent years, knowledge graphs(KGs) have become essential tools for visualizing concepts and retrieving contextual information. However, constructing KGs for new and specialized domains like Positive Energy Districts (PEDs) presents unique challenges, particularly when dealing with unstructured texts and ambiguous concepts from academic articles. READ MORE
-
8. Evolving Community Detection in Dynamic Networks using Nonnegative Tensor Decomposition : An Approach Toward Green Networking
University essay from Luleå tekniska universitet/DatavetenskapAbstract : Around 1.8–2.8% of the world’s total greenhouse gas emissions are contributed by the ICT sector, with telecommunications networks accounting for 26.4% of this total ICT share. READ MORE
-
9. Is the cultural field hypothesis true for Finland?
University essay from Mälardalens universitet/Akademin för utbildning, kultur och kommunikationAbstract : This study presents an in-depth analysis of spatial voting behavior in Finland at the municipality level, using electoral data from 1983 to 2019. The primary objective is to investigate if the cultural field hypothesis holds true for Finland. If this hypothesis holds, distinct cultural domains should emerge within Finland. READ MORE
-
10. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE