共 65 条
[21]
De Smedt Tom, 2018, ARXIV180304596
[22]
DEERWESTER S, 1990, J AM SOC INFORM SCI, V41, P391, DOI 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO
[23]
2-9
[24]
Deng H., 2011, PROC ACM SIGKDD C KN, P1271, DOI DOI 10.1145/2020408.2020600
[25]
Djaballah KA, 2019, 2019 SIXTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORKS ANALYSIS, MANAGEMENT AND SECURITY (SNAMS), P223, DOI [10.1109/SNAMS.2019.8931827, 10.1109/snams.2019.8931827]
[26]
Easley D., 2012, SIGNIFICANCE, V9, P43, DOI [DOI 10.1111/J.1740-9713.2012.00546.X, 10.1111/j.1740-9713.2012.00546.x]
[27]
Eisenstein J., 2013, Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies, P359
[28]
Faramondi L, 2019, IEEE SYS MAN CYBERN, P439, DOI [10.1109/smc.2019.8914665, 10.1109/SMC.2019.8914665]
[29]
Graph-Based Data-Collection Policies for the Internet of Things
[J].
4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018),
2018,
:9-16