共 116 条
[1]
Aggarwal C.C., 2007, Data streams: models and algorithms, P169, DOI [10.1007/978-0-387-47534-9_9, DOI 10.1007/978-0-387-47534-9_9]
[2]
Aggarwal C. C., 2006, P 32 INT C VER LARG, P607
[4]
Aggarwal Charu C, 2007, Data Streams: Models and Algorithms, V31
[5]
Ahmed M., 2014, The state of the art in intrusion prevention and detection, P3
[7]
A survey of anomaly detection techniques in financial domain
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 55
:278-288
[8]
Ahmed M, 2014, C IND ELECT APPL, P1780, DOI 10.1109/ICIEA.2014.6931456
[10]
Alon N., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P20, DOI 10.1145/237814.237823