2015
DOI: 10.1007/978-3-319-19066-2_32
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Potential Victims Within Enterprise Network via Link Analysis Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Data with off the scale magnitude may dominate other feature during data analyses. Natural logarithm (Log) and z-score are the well-known data standardization methods (Chiu et al 2015).Logarithmic transformation of data is suitable where the data covers a wide range of values. Among all of the standardization methods, Log transformation is one of the best methods to reduce the impact of outliers since it squeezes the bigger values and stretches smaller values.…”
Section: Standardizationmentioning
confidence: 99%
“…Data with off the scale magnitude may dominate other feature during data analyses. Natural logarithm (Log) and z-score are the well-known data standardization methods (Chiu et al 2015).Logarithmic transformation of data is suitable where the data covers a wide range of values. Among all of the standardization methods, Log transformation is one of the best methods to reduce the impact of outliers since it squeezes the bigger values and stretches smaller values.…”
Section: Standardizationmentioning
confidence: 99%