2021
DOI: 10.1088/1742-6596/1767/1/012007
|View full text |Cite
|
Sign up to set email alerts
|

A Context-free Grammar based Association Rule Mining Technique for Network Dataset

Abstract: Among various data mining concepts like prediction, clustering, classification, association and outlier discovery, association is a useful technique to extract the interesting relations among data items effectively. Association technique is applied in a number of applications like marketing, education, chemical, bioinformatics, computational linguistics and etc. The important purpose of association is to provide useful information of buying preferences of customers in supermarket in order to increase the sales… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…In addition to removing CC's restrictions on IoT application development, FC creates new opportunities for 5G (Saranyadevi et al, 2021) and embedded AI (Nguyen et al, 2021). Due to emerging trends in the processing power of EC and developments in hardware architecture, FC will find new usage in a variety of sectors.…”
Section: Fog Networking Outlinementioning
confidence: 99%
See 4 more Smart Citations
“…In addition to removing CC's restrictions on IoT application development, FC creates new opportunities for 5G (Saranyadevi et al, 2021) and embedded AI (Nguyen et al, 2021). Due to emerging trends in the processing power of EC and developments in hardware architecture, FC will find new usage in a variety of sectors.…”
Section: Fog Networking Outlinementioning
confidence: 99%
“…Intruders often investigate the technique for R2L vulnerability after weaponizing a target, which results in the rise of higher-level process by U2R threat. According to Saranyadevi et al (2021), several R2L risks, like imap & sendmail are brought on by BO in network programmes. A visitor abuses security measures that are either inefficient or incorrectly designed.…”
Section: Threats and Cyber-attacks In F2t Computingmentioning
confidence: 99%
See 3 more Smart Citations