… the application of the K-means clustering method to cyber-… algorithm, in order to determine the number of clusters, Elbow … These processes are implemented by utilizing Python 3.9 …
CITATION STYLE
ELİGÜZEL, N., & MANLA ALİ, L. (2022). Analyzing of Cyber-Security Concepts on Twitter. European Journal of Science and Technology. https://doi.org/10.31590/ejosat.1083377
Mendeley helps you to discover research relevant for your work.