共 50 条
[32]
Attack Pattern Mining Algorithm Based on Security Log
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI),
2017,
:205-205
[33]
Geo-Identification of Web Users through Logs using ELK Stack
[J].
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence),
2016,
:606-610
[34]
CRAXweb: Automatic Web Application Testing and Attack Generation
[J].
2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE),
2013,
:208-217
[35]
Recent Attack Prevention Techniques in Web Service Applications
[J].
2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT),
2016,
:1174-1180
[37]
Frequent sequence pattern based activity recognition in smart environment
[J].
INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS,
2018, 12 (03)
:349-357
[38]
Mining Frequent Spatio-Temporal Patterns in Wind Speed and Direction
[J].
CONNECTING A DIGITAL EUROPE THROUGH LOCATION AND PLACE,
2014,
:143-161
[39]
SPaMi-FTS: An Efficient Algorithm for Mining Frequent Sequential Patterns
[J].
PROGRESS IN PATTERN RECOGNITION IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, CIARP 2014,
2014, 8827
:470-477
[40]
Mining Frequent Sequential Patterns and Association Rules on Campus Map System
[J].
2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI),
2014,
:954-958