共 16 条
[1]
Accorsi R., 2013, Proceedings of the 28th Annual ACM Symposium on Applied Computing, P1462, DOI [DOI 10.1145/2480362.2480634, 10.1145/2480362.2480634]
[2]
Andress J., 2014, The basics of information security: understanding the fundamentals of InfoSec in theory and practice, V2nd
[3]
[Anonymous], PMS METHODOLOGY
[4]
[Anonymous], TECH REP
[5]
[Anonymous], 1590922011 ISO ISOIE
[6]
[Anonymous], ANOMALY DETECTION US
[8]
Brambilla Marco, 2012, MODELDRIVEN SOFTWARE
[9]
Dua S, 2011, DATA MINING AND MACHINE LEARNING IN CYBERSECURITY, P1, DOI 10.1201/b10867
[10]
Gomes A., 2016, Proceedings of the 29th Annual Symposium on User Interface Software and Technology, UIST'16 Adjunct, P159