共 25 条
[1]
[Anonymous], 1989, Conference on the Theory and Application of Cryptology, DOI 10.1007/0-387-34805-0_22
[2]
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[3]
Bergadano F, 1998, ACM T INFORMATION SY, V1, P3, DOI DOI 10.1145/290163.290164
[4]
Bishop C. M., 1996, Neural networks for pattern recognition
[5]
Bishop M., 1992, P 4 WORKSH COMP SEC, P1
[7]
BLUNDO C, 2002, P INFR SEC INFRASEC, P30
[8]
Boyarsky MK, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P63, DOI 10.1145/319709.319719
[9]
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156