共 46 条
[33]
Osama A., 2012, J APPL SCI RES, V8, P1748
[34]
Pascanu Razvan, 2013, PROC INT C MACH LEAR
[35]
Quinlan J. R., 1986, Machine Learning, V1, P81, DOI 10.1023/A:1022643204877
[36]
Rao A., 2005, Proceedings of the First International Conference on Information and Communication Technologies, ICICT 2005 IEEE, P233, DOI [10.1109/ICICT.2005.1598592, DOI 10.1109/ICICT.2005.1598592]
[37]
Revathi S., 2013, Int. J. Eng. Res. Technol. (IJERT), V2, P1848
[38]
Sabahi F., 2008, 2008 3rd International Conference on Systems and Networks Communications, P23, DOI 10.1109/ICSNC.2008.44
[40]
Stavroulakis P, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P829, DOI 10.1007/978-3-642-04117-4_38