共 25 条
[1]
[Anonymous], P DIMVA
[2]
[Anonymous], 2003, PRACTICAL GUIDE SUPP
[3]
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[5]
Catania C., 2008, INTELIGENCIA ARTIFIC, V12, P65
[8]
Eskin E., 2002, Applications of Data Mining in Computer Security, P77, DOI [10.1007/978-1-4615-0953-04, 10.1007/978-1-4615-0953-04.URLhttps:/]
[10]
Feng Y, 2005, PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, P3965