10 Questions 9 Answers 0 Followers
Questions related from J E T Akinsola
What are the tools one can use for extracting anomaly patterns in SQL injection attack dataset in order to build a model for the classification ?
08 August 2018 9,324 4 View
There are various secure learning systems, which of them can be implemented for SQL injection attack
08 August 2018 6,757 1 View
How can pattern learning anomaly detection can be carried out for SQL Injection attack.? Which of the learning anomaly detection tools can be used to classify SQL injection dataset?
08 August 2018 2,980 2 View
How can I get dataset (s) for SQL injection attack research to be implemented using Machine learning algorithms? What are the attributes classification for SQL injection attack detection?
08 August 2018 3,485 3 View
Cloud computing has been playing a major role in Audit assignment of recent. This approach has helped in increasing profitability.
07 July 2018 6,859 0 View
Big Data has been used in recent times to provide solutions to cyber security challenges. Therefore, many vulnerability assessment can be carried out. What are the types of vulnerability...
06 June 2018 2,455 5 View
I will like to know how Big Data Analytics can be applied in Social Network. What are the parameters to consider in social networks for big data analytics. How can I mine big data in social networks.
07 July 2016 7,818 4 View
Big Data phenomenon in mobile communication network are: Call Volume, Call Pattern and Location. Also, Call Detail Records (CDR) is of paramount importance in mobile communication network
07 July 2016 3,527 1 View
The Big Data collected from mobile communication network how can it be used for development
07 July 2016 4,610 2 View
The cost of memory must be reasonable in relationship to other components.
01 January 1970 10,323 0 View