共 63 条
- [1] Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm [J]. IEEE ACCESS, 2023, 11 : 118170 - 118185
- [2] Alcalde-Barros A., 2019, Big Data Anal., V4, DOI [10.1186/s41044-019-0041-8, DOI 10.1186/S41044-019-0041-8]
- [3] Alhaidari F., 2020, ICCAIS 2020 3 INT C, P1, DOI [10.1109/ICCAIS48893.2020.9096823, DOI 10.1109/ICCAIS48893.2020.9096823]
- [4] ONLINE WEB NAVIGATION ASSISTANT [J]. VESTNIK UDMURTSKOGO UNIVERSITETA-MATEMATIKA MEKHANIKA KOMPYUTERNYE NAUKI, 2021, 31 (01): : 116 - 131
- [5] Ali N.M., 2020, PATHOGENIC BACTERIA, P1
- [8] Ashraf M., 2020, Int. J. Comput. Appl., V177, P32, DOI [10.5120/ijca2020919772, DOI 10.5120/IJCA2020919772]
- [9] Maximal paths recipe for constructing Web user sessions [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2022, 25 (06): : 2455 - 2485
- [10] Using Web Server Logs to Identify and Comprehend Anomalous User Activity [J]. 2023 17TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, CONTEL, 2023,