1 |
Woo, Jiyoung, and Huy Kang Kim. "Survey and research direction on online game security." Proceedings of the Workshop at SIGGRAPH Asia. ACM, 2012.
|
2 |
Nataraj, Lakshmanan, et al. "Malware images: visualization and automatic classification." Proceedings of the 8th international symposium on visualization for cyber security. ACM, 2011.
|
3 |
Trinius, Philipp, et al. "Visual analysis of malware behavior using treemaps and thread graphs." Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. IEEE, 2009.
|
4 |
Quist, Daniel A., and Lorie M. Liebrock. "Visualizing compiled executables for malware analysis." Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. IEEE, 2009.
|
5 |
Shaid, Syed Zainudeen Mohd, and Mohd Aizaini Maarof. "Malware behavior image for malware variant identification." Biometrics and Security Technologies (ISBAST), 2014 International Symposium on. IEEE, 2014.
|
6 |
Ponemon Institute - Measuring Trust In Privacy And Security. https://www.ponemon.org/
|
7 |
Wei, Chih-Ping, and I-Tang Chiu. "Turning telecommunications call details to churn prediction: a data mining approach." Expert systems with applications 23.2 pp. 103-112. 2002.
DOI
|
8 |
Borbora, Zoheb H., and Jaideep Srivastava. "User behavior modelling approach for churn prediction in online games." Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 2012.
|
9 |
Coussement, Kristof, and Dirk Van den Poel. "Churn pre-diction in subscription services: An application of support vector machines while comparing two parameter-selection techniques." Expert systems with applications 34.1 pp. 313-327. 2008
DOI
|
10 |
Khan, Afaq Alam, Sanjay Jamwal, and M. M. Sepehri. "Applying data mining to customer churn prediction in an internet service provider." International Journal of Computer Applications 9.7 pp. 8-14. 2010.
DOI
|
11 |
Runge, Julian, et al. "Churn prediction for high-value play-ers in casual social games." Computational Intelligence and Games (CIG), 2014 IEEE Conference on. IEEE, 2014.
|
12 |
Bauckhage, Christian, et al. "How players lose interest in playing a game: An empirical study based on distributions of total playing times." Computational Intelligence and Games (CIG), 2012 IEEE conference on. IEEE, 2012.
|
13 |
bin2png. https://github.com/ESultanik/bin2png
|
14 |
Fatma, Shaikh Nikhat. "Image mining method and frameworks." International Journal of Computational Engineering Research (Ijceronline. Com) pp. 135-145. 2012
|
15 |
PNG (Portable Network Graphics) Specification, Version 1.1 http://www.libpng.org/pub/png/spec/1.1/PNG-Rationale.html#R.PNG-file-signature
|
16 |
CIG 2017. Game Data Mining Competition. https://cilab.sejong.ac.kr/gdmc2017/
|
17 |
Joachims, Thorsten. "Text categorization with support vector machines: Learning with many relevant features." Machine learning: ECML-98 pp. 137-142. 1998.
|
18 |
Cristianini, Nello, John Shawe-Taylor, and Huma Lodhi. "Latent semantic kernels." Journal of Intelligent Information Systems 18.2 pp. 127-152. 2002.
DOI
|
19 |
Visual Object Detection, Recognition & Tracking (without Deep Learning) https//www.slideshare.net/yuhuang/visual-object-detection-recognition-tracking-without-deep-learning
|
20 |
Powers. David M. W, "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation," Journal of Machine Learning Technologies, No.2, pp. 37-63. 2011.
|
21 |
Debeauvais, Thomas, et al. "Retention and progression: Seven months in World of Warcraft." FDG. 2014.
|
22 |
Bertens, Paul, Anna Guitart, and Africa Perianez. "Games and Big Data: A Scalable Multi-Dimensional Churn Prediction Model." arXiv preprint arXiv:1710.02262. 2017.
|
23 |
G. O. Young, "Synthetic structure of industrial plastics," in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill. pp. 15-64. 1964.
|
24 |
Lodhi, Huma, et al. "Text classification using string kernels." Journal of Machine Learning Research. pp. 419-444. Feb. 2002
|