共 12 条
[1]
[Anonymous], 2004, Proceedings of the 2004 ACM SIGMOD international conference on Management of data
[2]
Bin Song, 2010, 2010 INT C INT TECHN, P1
[3]
Castiglione A., 2011, Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), P520, DOI 10.1109/IMIS.2011.65
[4]
Cheneau T., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P249, DOI 10.1109/ICNSS.2011.6060009
[5]
Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks
[J].
PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE,
2009,
:323-328
[6]
Radinsky Kira, 2012, P 21 INT C WORLD WID, P599, DOI [10.1145/2187836.2187918, DOI 10.1145/2187836.2187918]
[7]
Shafer Ilari., 2012, P 18 ACM SIGKDD INT, P1158
[8]
Spiegel S., 2011, The fifth international workshop on knowledge discovery from sensor data, P34, DOI DOI 10.1145/2003653.2003657
[9]
Sridevi S., 2010, IITM 10, P163
[10]
Wan Li., 2009, Proceedings of the Third International Workshop on Knowledge Discovery from Sensor Data, SensorKDD'09, P87