共 13 条
[1]
[Anonymous], 2002, Proceedings of The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, DOI DOI 10.1145/775047.775080
[2]
Atallah M., 1999, PROC 1999 WORKSHOP K, P45, DOI DOI 10.1109/KDEX.1999.836532
[3]
Chang LW, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P82
[4]
Dasseni E., 2001, Information Hiding, Proceedings of the 4th International Workshop, IH 2001, Pittsburgh, PA, USA, 25-27 April 2001, P369, DOI DOI 10.1007/3-540-45496-9_27
[5]
Johnsten T., 2002, P 16 ANN IFIP WG 11, P163
[6]
MANILLA H, 1996, P 2 INT C KNOWL DISC, P189
[7]
Moskowitz I. S., 1999, PADD99. Proceedings of the Third International Conference on the Practical Application of Knowledge Discovery and Data Mining, P159
[8]
MOSKOWITZ IS, 2000, COMPUTATIONAL INTELL
[9]
Oliveira S. R., 2002, P IEEE INT C PRIV SE, P43
[10]
Pontikakis ED, 2004, INT FED INFO PROC, V144, P325