2016
DOI: 10.5596/c16-022
|View full text |Cite
|
Sign up to set email alerts
|

Mendeley Data

Abstract: Elsevier's Mendeley Data product is attractive, easy to use, and functional. Nevertheless, its relatively late entry onto the research data repository landscape means that it lags behind competitors in terms of number of datasets published, search functionality, sharing features, and citation features. Further integration with Elsevier's lab bench notebook HiveBench, as well as forthcoming integration with Elsevier's research profiling tool Pure, may increase the appeal of Mendeley Data for researchers seeking… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Ahuja et al [24] used various DL algorithms to detect the DDOS attacks: CNN, RNN, LSTM, CNN-LSTM, support vector classifier-self organizing map (SVC-SOM), and stacked autoencoder-multi layer perceptron (SAE-MLP). The team used the dataset provided by leading India Project Mentor [25], which consists of 22 features. Two different optimizers were used: stochastic gradient descent (SGD) for the first 10 epochs and Adam for the next 150 epochs.…”
Section: Ddos Attacksmentioning
confidence: 99%
“…Ahuja et al [24] used various DL algorithms to detect the DDOS attacks: CNN, RNN, LSTM, CNN-LSTM, support vector classifier-self organizing map (SVC-SOM), and stacked autoencoder-multi layer perceptron (SAE-MLP). The team used the dataset provided by leading India Project Mentor [25], which consists of 22 features. Two different optimizers were used: stochastic gradient descent (SGD) for the first 10 epochs and Adam for the next 150 epochs.…”
Section: Ddos Attacksmentioning
confidence: 99%
“…Section 3 gives information about the dataset and the image annotation process. Section 4 describes the ways to access data via Mendeley Data Repository [2] or LOD cloud [3]. Section 5 presents a CNN (convolutional neural network) application for demonstrating the ease of use provided by the Hermos dataset.…”
Section: Introductionmentioning
confidence: 99%