共 16 条
- [1] Detecting, tracking, and counteracting terrorist networks via hidden Markov models [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3246 - 3257
- [2] [Anonymous], 2002, P ACM WORKSH SCI ASP
- [3] CHANGWEN Q, 2002, P 6 INT C SIGNAL PRO, V2, P1091
- [4] *CISC SYST INC, 2003, NETF REP GUID APR
- [5] DAIN O, 2001, P ACM WORKS DAT MIN
- [6] Hall DL, 1997, P IEEE, V85, P6, DOI [10.1109/5.554205, 10.1109/ISCAS.1998.705329]
- [7] LITTLE E, 2005, TR2005269
- [8] Network vulnerability assessment using Bayesian networks [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 61 - 71
- [9] LLINAS J, 2004, P 7 INT C INF FUS ST, P1218
- [10] NOEL S, P ACSAC DEC 2004