共 31 条
[1]
Danowski J. A., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P164, DOI 10.1109/EISIC.2012.53
[2]
Dascalu M., 2011, 2011 10 INT S PAR DI, P133
[3]
Assessing Computer Network Security with Fuzzy Analytic Hierarchy Process
[J].
2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 5,
2010,
:204-208
[4]
Guang Cheng, 2010, 2010 IEEE 17th International Conference on Industrial Engineering and Engineering Management (IE&EM2010), P1124, DOI 10.1109/ICIEEM.2010.5645938
[5]
Jasika Nadira, 2012, 2012 35th International Convention on Information and Communication Technology, Electronics and Microelectronics, P1811
[7]
Jin Yunye., 2010, INFOCOM, 2010 Proceedings IEEE, P1
[8]
Jiongqian Liang, 2012, 2012 International Conference on Systems and Informatics (ICSAI 2012), P161, DOI 10.1109/ICSAI.2012.6223358
[9]
Semantic analysis of web pages using web patterns
[J].
2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS),
2006,
:329-+
[10]
Lechevin N., 2011, 2011 American Control Conference - ACC 2011, P2210