共 32 条
[21]
McIver A., 2010, CORR
[22]
McIver A, 2010, LECT NOTES COMPUT SC, V6199, P223, DOI 10.1007/978-3-642-14162-1_19
[23]
McLean J., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P180, DOI 10.1109/RISP.1990.63849
[24]
Millen J. K., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P60
[25]
Pan JN, 2006, 2006 IEEE INTERNATIONAL CONFERENCE ON MANAGEMENT OF INNOVATION AND TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, P783
[26]
Parmigiani G., 2009, DECISION THEORY PRIN, VVolume 812
[28]
Smith G, 2011, BALLET REV, V39, P8
[29]
Smith G, 2009, LECT NOTES COMPUT SC, V5504, P288
[30]
Witten M. H. C. P. I., 2011, DATA MINING PRACTICA