共 53 条
- [31] Introduction to Information Retrieval [J]. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2010, 61 (04): : 852 - 853
- [32] Lave J., 1991, Situated Learning: Legitimate Peripheral Participation, P1
- [34] Mining Key-Hackers on Darkweb Forums [J]. 2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 73 - 80
- [35] Matei Sorin Adam, 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), P72, DOI 10.1145/3110025.3110040
- [36] McMillan R, 2013, THREAT INTELLIGENCE
- [39] Cyber-risk decision models: To insure IT or not? [J]. DECISION SUPPORT SYSTEMS, 2013, 56 : 11 - 26