共 47 条
[1]
[Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
[2]
[Anonymous], 2013, HDB ASIAN CRIMINOLOG, DOI DOI 10.1007/978-1-4614-5218-8
[5]
Brugger S., 2004, Data mining methods for network intrusion detection
[8]
Engen Vegard, 2011, Intelligent Data Analysis, V15, P251, DOI 10.3233/IDA-2010-0466
[9]
Fontugne R., 2008, P 4 AS C INT ENG, P17, DOI 10.1145/1503370.1503377