共 37 条
[1]
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]
BLAKE CL, 1998, UCI RESP MACHINE LEA
[5]
Breiman L., 1998, CLASSIFICATION REGRE
[6]
BRODLEY CE, 1995, MACH LEARN, V19, P45, DOI 10.1007/BF00994660
[9]
Gama J., 1999, Intelligent Data Analysis, V3, P1, DOI 10.1016/S1088-467X(99)00002-5
[10]
GEHRKE J, 1998, P 24 INT C VERY LARG