共 22 条
- [11] Radhakrishna V., 2015, ACM INT C P SERIES, DOI [10.1145/2832987.2833077, DOI 10.1145/2832987.2833077]
- [12] Radhakrishna V., P ACM ICEMIS 2015 AU
- [13] A Modified Gaussian Similarity Measure for Clustering Software Components and Documents [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE INFORMATION SYSTEMS AND DESIGN OF COMMUNICATION (ISDOC2014), 2014, : 99 - 104
- [14] Document Clustering Using Hybrid XOR Similarity Function for Efficient Software Component Reuse [J]. FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 121 - 128
- [15] Fuzzy Intrusion Detection System via Data Mining Technique With Sequences of System Calls [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 154 - 157
- [16] Seleznyov Alexandr, 2002, P ACM S APPL COMP, P209
- [18] Network intrusion detection based on system calls and data mining [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
- [19] Wee K, 2006, LECT NOTES ARTIF INT, V3918, P594
- [20] Xu X, 2005, LECT NOTES COMPUT SC, V3644, P995