共 17 条
[1]
Agrawal S., 2012, JMLR P, P1
[3]
How Serendipity Improves User Satisfaction with Recommendations? A Large-Scale User Evaluation
[J].
WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019),
2019,
:240-250
[4]
Chen Wei, 2013, INT C MACH LEARN, V28, P151
[5]
Interactive Anomaly Detection on Attributed Networks
[J].
PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19),
2019,
:357-365
[6]
Evina PA, 2019, INT WIREL COMMUN, P1866
[7]
Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection
[J].
POLICY-BASED AUTONOMIC DATA GOVERNANCE (PADG 2018),
2019, 11550
:82-90
[8]
CyberRank-Knowledge Elicitation for Risk Assessment of Database Security
[J].
CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT,
2016,
:2009-2012
[9]
Kaplan J., 2011, Meeting the cybersecurity challenge
[10]
Kuleshov V., 2014, ARXIV PREPRINT ARXIV