共 30 条
[1]
Alon N., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P20, DOI 10.1145/237814.237823
[3]
[Anonymous], P 15 C USENIX SEC S
[4]
[Anonymous], 1984, OLSHEN STONE CLASSIF, DOI 10.2307/2530946
[5]
Dainotti A, 2009, LECT NOTES COMPUT SC, V5537, P64, DOI 10.1007/978-3-642-01645-5_8
[6]
Dorfinger P, 2011, LECT NOTES COMPUT SC, V6613, P164, DOI 10.1007/978-3-642-20305-3_14
[7]
Behavioral authentication of server flows
[J].
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2003,
:46-55
[9]
A comparison of methods for multiclass support vector machines
[J].
IEEE TRANSACTIONS ON NEURAL NETWORKS,
2002, 13 (02)
:415-425