共 15 条
[1]
Antipov S, 2012, SOFTW SYST, V2, P78
[2]
Antipov S., 2016, P 1 INT SCI C INT IN, P63, DOI DOI 10.1007/978-3-319-33609-1_6
[3]
Antipov S. G., 2017, OP SEM TECHN INT SYS, P195
[4]
Using argumentation logic for firewall policy specification and analysis
[J].
LARGE SCALE MANAGEMENT OF DISTRIBUTED SYSTEMS, PROCEEDINGS,
2006, 4269
:185-196
[5]
Chen Y., 2015, The UCR Time Series Classification Archive
[6]
Golovina E., 2008, FIZMATLIT
[7]
Khosravifar Babak, 2008, 2008 22nd International Conference on Advanced Information Networking and Applications - Workshops, P997, DOI 10.1109/AINA.2008.44
[8]
Lichman M., UCI MACHINE LEARNING
[9]
Lin J., 2003, P 8 ACM SIGMOD WORKS, P2, DOI [DOI 10.1145/882082.882086.S2CID6084733, 10.1145/882082.882086, DOI 10.1145/882082.882086]
[10]
Ou Xinming., 2005, USENIX SECURITY