共 36 条
[1]
A prudent based approach for compromised user credentials detection
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2018, 21 (01)
:423-441
[3]
Becha M., 2020, 2020 INT MULT ORG KN, P1, DOI [10.1109/OCTA49274.2020.9151854, DOI 10.1109/OCTA49274.2020.9151854]
[5]
Bertolotti T., 2013, P VIRT REAL INT C LA, DOI [10.1145/2466816.2466850, DOI 10.1145/2466816.2466850]
[6]
Balancing Resources and Load: Eleven Nontechnical Phenomena that Contribute to Formation or Persistence of Technical Debt
[J].
2019 IEEE/ACM INTERNATIONAL CONFERENCE ON TECHNICAL DEBT (TECHDEBT 2019),
2019,
:38-47
[7]
Brown N, 2010, P FSESDP WORKSHOP FU, P47
[8]
Clair K, 2016, D-Lib Mag., V22, DOI [10.1045/november16-clair, DOI 10.1045/NOVEMBER16-CLAIR]