共 24 条
- [1] Bhatia S, 2020, Arxiv, DOI arXiv:1911.04464
- [2] SEDANSPOT: Detecting Anomalies in Edge Streams [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 953 - 958
- [3] F. E. R. Commission, 2015, ENR DAT
- [5] FRAUDAR: Bounding Graph Fraud in the Face of Camouflage [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 895 - 904
- [10] Lippmann Richard, 1999, Recent Advances in Intrusion Detection, V99, P829