共 50 条
[41]
An Efficient Algorithm for Mining Maximal Frequent Sequential Patterns in Large Databases
[J].
2018 INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK AND ARTIFICIAL INTELLIGENCE (CNAI 2018),
2018,
:404-410
[43]
Ontology Based Web Usage Mining Model
[J].
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT),
2017,
:356-362
[44]
ECEM - Generating Adversarial Logs under Black-box Setting in Web Security
[J].
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM),
2020,
[45]
Visualizing Web Attack Scenarios in Space and Time Coordinate Systems
[J].
TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XVI,
2014, 8960
:1-14
[46]
TridentShell: A Covert and Scalable Backdoor Injection Attack on Web Applications
[J].
INFORMATION SECURITY (ISC 2021),
2021, 13118
:177-194
[47]
A Graph-Based Differentially Private Algorithm for Mining Frequent Sequential Patterns
[J].
APPLIED SCIENCES-BASEL,
2022, 12 (04)
[48]
Mining maximal frequent access sequences based on improved WAP-tree
[J].
ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1,
2006,
:616-620
[49]
Data mining approach to web application intrusions detection
[J].
PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2011,
2011, 8008
[50]
Web Usage Mining Algorithm for an Academic Search Application
[J].
PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019),
2019,
:675-680