共 10 条
[3]
One-Class Models for Continuous Authentication Based on Keystroke Dynamics
[J].
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016,
2016, 9937
:416-425
[4]
Monaco J. V., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P210, DOI 10.1109/EISIC.2012.58
[6]
Petrovskiy Mikhail, 2017, Mining Intelligence and Knowledge Exploration. 5th International Conference, MIKE 2017. Proceedings: LNAI 10682, P240, DOI 10.1007/978-3-319-71928-3_24
[7]
Petrovskiy M, 2003, LECT NOTES COMPUT SC, V2877, P189
[8]
Schölkopf B, 2000, ADV NEUR IN, V12, P582
[10]
Dark Web Forums Portal: Searching and Analyzing Jihadist Forums
[J].
ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS,
2009,
:71-76