共 15 条
- [1] Ali S, 2016, INT BHURBAN C APPL S, P35, DOI 10.1109/IBCAST.2016.7429850
- [2] Breiman L., 1984, BIOMETRICS, V1st ed.
- [3] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
- [4] Cohen W. W., 1995, MACH LEARN P, P115, DOI DOI 10.1016/B978-1-55860-377-6.50023-2
- [6] Freitas A.A., 2013, SIGKDD Explor. Newsl, V15, P1, DOI DOI 10.1145/2594473.2594475
- [8] Hall M.A., 1998, THESIS U WAIKATO HAM