共 34 条
[1]
[Anonymous], 2008, BOTMINER CLUSTERING
[2]
[Anonymous], 2014, CISCO ANN SECURITY R
[3]
[Anonymous], 2011, P NDSS SAN DIEG CA
[4]
Arora A., 2013, P 12 INT C COGN MOD, P336
[5]
Ayala L., 2016, Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention, DOI DOI 10.1007/978-1-4842-2155-6
[6]
Bilge L, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P129
[8]
Playing Hide-and-Seek: An Abstract Game for Cyber Security
[J].
1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY,
2014,
[9]
Collins MP, 2007, LECT NOTES COMPUT SC, V4637, P276
[10]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232