共 33 条
[1]
Abdel-Aziz AS, 2013, COMM COM INF SC, V381, P219
[2]
Abid A., 2015, 2015 12 INT MULT C S, P1
[3]
Survey on Anomaly Detection using Data Mining Techniques
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015,
2015, 60
:708-713
[4]
Akoglu L., 2012, 21 ACM INT C INF KNO, P1
[5]
Anderson R., 2003, SECURITY ENG GUIDE B, P325
[6]
Andropov S, 2017, PROC CONF OPEN INNOV, P26, DOI 10.23919/FRUCT.2017.8071288
[7]
[Anonymous], 2010, P 14 INT C HARM QUAL
[8]
Aziz ASA, 2013, 2013 13TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), P215, DOI 10.1109/HIS.2013.6920485
[9]
Anomaly detection from log files using data mining techniques
[J].
Lecture Notes in Electrical Engineering,
2015, 339
:449-457