共 19 条
[1]
[Anonymous], STUDIES COMPUTATIONA, DOI DOI 10.1007/978-3-319-05029-4_7
[2]
[Anonymous], 2007, Eye tracking methodology: Theory and practice, DOI DOI 10.1007/978-3-319-57883-5
[3]
The Use of Statistical Signatures to Detect Anomalies in Computer Network
[J].
ANALYSIS AND SIMULATION OF ELECTRICAL AND COMPUTER SYSTEMS,
2015, 324
:251-260
[4]
Study the Quality of Global Neural Model with Regard to the Local Models of Dynamic Complex System
[J].
ANALYSIS AND SIMULATION OF ELECTRICAL AND COMPUTER SYSTEMS,
2015, 324
:35-61
[5]
Modeling Manufacturing Processes with Disturbances - A New Method Based on Algebraic-Logical Meta-Models
[J].
ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, PT II (ICAISC 2015),
2015, 9120
:353-363
[6]
Algebraic Logical Meta-Model of Decision Processes - New Metaheuristics
[J].
ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, PT I,
2015, 9119
:541-554
[7]
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[8]
Wireless Networks Environment and Complex Networks
[J].
ANALYSIS AND SIMULATION OF ELECTRICAL AND COMPUTER SYSTEMS,
2015, 324
:261-270
[10]
Lu Y., 2015, P INT JOINT C ART IN