共 32 条
[1]
Amoli P. V., 2016, INT J DIGIT CONTENT, VVol. 10, P1
[2]
Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data
[J].
SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY,
2016,
:7-16
[3]
Chi Hoi-Ming, 2005, Feature Selection Using Random Probes and Linear Support Vector Machines
[5]
Faizal M.A., 2009, ( IJCSIS) International Journal of Computer Science and Information Security, V1
[6]
Gupta Kapil Kumar, 2010, IEEE Trans. On Dependable and Secure Computing, V7
[7]
Gupta Kapil Kumar, 2007, 21 INT C ADV INF NET
[9]
Lafferty JD., 2001, INT C MACH LEARN, P282
[10]
Liang Junwei, 2019, IEEE Transactions On Intelligent Transportation Systems