共 5 条
[1]
Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919
[2]
Gorton D., 2003, THESIS CHALMERS U TE
[3]
Han JW, 2000, SIGMOD RECORD, V29, P1
[4]
Intrusion Detection Based on Data Mining
[J].
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS,
2009,
:696-701
[5]
Treinen JJ, 2006, LECT NOTES COMPUT SC, V4219, P1