共 29 条
[1]
Ahmed Tarem., 2007, P 2 USENIX WORKSH TA, P1
[2]
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[3]
Learning Deep Architectures for AI
[J].
FOUNDATIONS AND TRENDS IN MACHINE LEARNING,
2009, 2 (01)
:1-127
[4]
Bishop C., 2006, PATTERN RECOGN, DOI DOI 10.1117/1.2819119
[5]
Brugger S.T., 2007, TECHNICAL REPORT
[6]
Castiglione A., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P603, DOI 10.1109/IMIS.2012.125
[7]
Castiglione A., J NETWORK C IN PRESS, DOI DOI 10.1016/JJNCA.2013.05.002
[8]
Chen CL, 2008, IEEE SYS MAN CYBERN, P2602
[9]
Davenport M., 2006, P 2006 16 IEEE SIGN, P301
[10]
Ficco M., 2011, 2011 First International Conference on Data Compression, Communications and Processing, P275, DOI 10.1109/CCP.2011.43