共 279 条
[2]
Abello J., 2010, Proceedings 2010 10th IEEE International Conference on Data Mining (ICDM 2010), P8, DOI 10.1109/ICDM.2010.145
[3]
Agarwal D., 2005, Proc. IEEE Int'l Conf. Data Mining (ICDM), P8
[4]
Agarwal Sameer, 2006, P 23 INT C MACH LEAR, P17
[5]
Aggarwal C. C., 2012, Proceedings of the 2012 SIAM International Conference on Data Mining, P624
[6]
Aggarwal CC, 2001, SIGMOD RECORD, V30, P37
[7]
NIDS: A network based approach to intrusion detection and prevention
[J].
IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE,
2009,
:141-144
[8]
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[9]
Akilarasu G, 2016, WIREL NETW, P1
[10]
Akoglu L, 2010, LECT NOTES ARTIF INT, V6119, P410