共 25 条
[1]
[Anonymous], 2017, P 2017 SIAM INT C DA
[2]
Blanco V, 2020, J MACH LEARN RES, V21
[3]
Chowdhury Mozammel., 2017, International Conference on Applications and Techniques in Cyber Security and Intelligence, P266
[4]
Chowdhury Mozammel., 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence, P266, DOI DOI 10.1007/978-3-319-67071-333
[5]
Das R., 2018, 2018 IEEE INT C COMM, P1, DOI DOI 10.1109/ICC.2018.8422832
[6]
DataTechNotes, 2020, AN DET EX ON CLASS S
[8]
Ding Z., 2013, IFAC Proc., V46, P12, DOI DOI 10.3182/20130902-3-CN-3020.00044
[9]
Gavrylenko S., 2019, EASTERNEUROPEAN J EN, V1, P22, DOI [10.15587/1729-4061.2019.157085, DOI 10.15587/1729-4061.2019.157085]
[10]
Gavrylenko S., 2020, P 30 INT SCI S METRO