共 22 条
[1]
Towards more Trustable Log Files for Digital Forensics by Means of "Trusted Computing"
[J].
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2010,
:1020-1027
[2]
Carman Mark J, 2010, P CIKM, P1849
[3]
Cooley R., 1999, Knowledge and Information Systems, V1, P5
[4]
Web mining: Information and pattern discovery on the World Wide Web
[J].
NINTH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS,
1997,
:558-567
[5]
Dwivedi S., 2017, INT J ENG SCI RES TE, V6, P547
[7]
Analysis of Users' Behavior in Structured e-Commerce Websites
[J].
IEEE ACCESS,
2017, 5
:11941-11958
[8]
Huang LC, 2008, ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 1, P675
[9]
Astrain JJ, 2010, SEMAPRO 2010: THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN SEMANTIC PROCESSING, P49
[10]
Jaya Kumar V., 2013, INT J SCI ENV TECHNO, V2, P1008