Search Results for Mobile communication systems. - Narrowed by: Data mining.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMobile$002bcommunication$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Data$002bmining.$002509Data$002bmining.$0026ps$003d300?dt=list
2026-01-09T00:57:02Z
Networks attack detection on 5G networks using data mining techniques
ent://SD_ILS/0/SD_ILS:556189
2026-01-09T00:57:02Z
2026-01-09T00:57:02Z
Author Pande, Sagar Dhanraj, editor. Khamparia, Aditya, 1988- editor.<br/>Preferred Shelf Number TK5103.25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470281">https://www.taylorfrancis.com/books/9781003470281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Data Mining and Applications
ent://SD_ILS/0/SD_ILS:484508
2026-01-09T00:57:02Z
2026-01-09T00:57:02Z
Author Jiang, Hao. author. Chen, Qimei. author. Zeng, Yuanyuan. author. Li, Deshi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16503-1">https://doi.org/10.1007/978-3-030-16503-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2026-01-09T00:57:02Z
2026-01-09T00:57:02Z
Author Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>