共 39 条
[1]
Agrawal S., 2012, COLT
[2]
Alonso S, 2016, Cyber threat hunting (1): Intro
[5]
Bandits with Knapsacks (Extended Abstract)
[J].
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS),
2013,
:207-216
[6]
Bouwman X, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P433
[7]
Brewer R, 2019, COMPUT FRAUD SECUR, P8, DOI [10.1016/s1361-3723(19)30106-x, 10.1016/S1361-3723(19)30106-X]
[8]
Multi-Armed Recommender System Bandit Ensembles
[J].
RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS,
2019,
:432-436
[9]
Chen Wei., 2013, INT C MACHINE LEARNI, P151
[10]
Crowdstrike, 2019, CROWDSTRIKE FALCON O