共 11 条
[1]
[Anonymous], Data Mining Practical Machine Learning Tools and Techniques with Java
[2]
BAUER L, 2008, 13 ACM S ACC CONTR M, P185
[3]
Bishop M., 2002, Computer Security: Art and Science
[4]
ENE A, 2008, 13 ACM S ACC CONTR M, P21
[5]
MOLLOY I, 2009, 14 ACM S ACC CONTR M, P21
[6]
MUKKAMALA R, 1990, 22 WINT SIM C, P839
[7]
Sandhu R., 1996, IEEE Computer, V29, P38
[8]
VAIDYA J, 2008, IEEE T DEPENDABLE SE, V28
[9]
Vaidya J., 2006, Proceedings of the 13th ACM conference on Computer and communications security, P144
[10]
Vaidya J, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P11