共 10 条
[1]
[Anonymous], 2017, IBM XFORCE THREAT IN
[2]
[Anonymous], 2010, INFORM SECURITY RISK
[4]
Ben-Asher N., 2017, CYBER SECURITY INFOR, V5
[6]
Das S, 2016, IEEE DATA MINING, P853, DOI [10.1109/ICDM.2016.0102, 10.1109/ICDM.2016.164]
[7]
Ponemon Institute LLC, 2017, TECH REP
[9]
Renners L, 2017, PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, P398, DOI 10.1109/IDAACS.2017.8095112
[10]
AI2: Training a big data machine to defend
[J].
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS),
2016,
:49-54