共 28 条
[2]
Bradley P. S., 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P91
[3]
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486
[4]
Clifton C., 2003, P 9 ACM SIGKDD INT C, P206, DOI DOI 10.1145/956755.956776
[5]
Doganay M.C., 2008, Proceedings of the 2008 international workshop on Privacy and anonymity in information society, P3
[6]
Du WL, 2001, 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P102, DOI 10.1109/ACSAC.2001.991526
[7]
Erkin Z., 2007, EURASIP Journal on Information Security, V7, P1, DOI 10.1155/2007/78943