共 21 条
[1]
[Anonymous], 2014, C4. 5: programs for machine learning
[2]
Aruajo N., 2010, IEEE 17 INT C TEL IC, P552
[3]
Borji A, 2007, LECT NOTES COMPUT SC, V4846, P254
[4]
Chen Y.S., 2009, CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, P3, DOI DOI 10.1145/1599272.1599276
[5]
Claise B., 2004, 3954 RFC NETW WORK G
[6]
Ghali NI, 2009, INT J COMPUT SCI NET, V9, P285
[7]
Gogoi P., 2010, Journal of Convergence Information Technology, V5, P95, DOI DOI 10.4156/JCIT.VOL5.ISSUE1.11
[8]
Gogoi P, 2012, COMM COM INF SC, V306, P322
[9]
Govindarajan M., 2011, INT J RES REV INFORM, V1, P2046
[10]
Haag Peter, USER DOCUMENTATION N