共 40 条
[1]
Aggarwal C. C., 2012, MINING TEXT DATA, P163, DOI [DOI 10.1007/978-1-4614-3223-46, DOI 10.1007/978-1-4614-3223-4, 10.1007/978-1-4614-3223-4]
[2]
Almalawi A., 2013, C LOCAL COMPUT NETW, P639, DOI DOI 10.1109/LCN.2013.6761301
[3]
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems
[J].
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013),
2013,
:292-301
[4]
Ankerst M., 1999, SIGMOD Record, V28, P49, DOI 10.1145/304181.304187
[5]
[Anonymous], 2007, COMPUTER COMMUN
[6]
[Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
[7]
[Anonymous], 1988, Algorithms for Clustering Data
[8]
[Anonymous], 2003, P PASS ACT MEAS WORK
[9]
[Anonymous], 2005, P C DAT MIN DAT WAR
[10]
FCM - THE FUZZY C-MEANS CLUSTERING-ALGORITHM
[J].
COMPUTERS & GEOSCIENCES,
1984, 10 (2-3)
:191-203