共 13 条
[1]
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[2]
Cohen W.W., 1995, P 12 INT C MACH LEAR, P115, DOI [10.1016/b978-1-55860-377-6.50023-2, DOI 10.1016/B978-1-55860-377-6.50023-2]
[3]
Hu Y., 2004, SAC 04, P711, DOI DOI 10.1145/967900.968048
[4]
KALLE B, 2007, INFORM SECURITY TECH, V12, P56
[5]
Kohonen T., 2001, Self-Organizing Maps
[6]
Kwok JTY, 1998, ICONIP'98: THE FIFTH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING JOINTLY WITH JNNS'98: THE 1998 ANNUAL CONFERENCE OF THE JAPANESE NEURAL NETWORK SOCIETY - PROCEEDINGS, VOLS 1-3, P347
[7]
LEE W, 2000, P 3 INT WORKSH REC A, P49
[8]
MacQueen J., 1967, P 5 BERK S MATH STAT, V1, P281, DOI DOI 10.1007/S11665-016-2173-6
[9]
Oh SH, 2003, COMPUT SECUR, V22, P596, DOI 10.1016/S0167-4048(03)00710-7
[10]
Portnoy L., 2001, Proc. ACM CSS Workshop on Data Mining Applied to Security (DMSA), P5