Well Log Data Inversion Using Radial Basis Function Network
Predicting zero-day software vulnerabilities through data mining --Second Presentation