共 18 条
- [1] Li D.M., 2002, INTELLIGENCE COMMAND, P58
- [2] Li F, 2017, COMPUTER INFORM TECH, V25, P48, DOI [10.3969/j.issn.1005-1228.2017.06.013, DOI 10.3969/J.ISSN.1005-1228.2017.06.013]
- [3] Liu Q., 2015, SHANDONG IND TECHNOL, P239
- [4] Lu B., 2020, NETWORK PROGRAMMING
- [5] Lu K., 2016, J ANHUI U SCI TECHNO, V36, P41, DOI [10.3969/j.issn.1672-1098.2016.05.009, DOI 10.3969/J.ISSN.1672-1098.2016.05.009]
- [6] Association rules mining using heavy itemsets [J]. DATA & KNOWLEDGE ENGINEERING, 2007, 61 (01) : 93 - 113
- [7] Wang L.H., 2017, J INFORM SECURYITY R, V3, P810, DOI [10.3969/j.issn.2096-1057.2017.09.006, DOI 10.3969/J.ISSN.2096-1057.2017.09.006]
- [8] Wang Q.G., 2018, CYBERSPACE SECURITY, V9, P92
- [9] Wang X.H, 2019, CHINA NEW TELECOMMUN, V21, P165, DOI [10.3969/j.issn.1673-4866.2019.06.136, DOI 10.3969/J.ISSN.1673-4866.2019.06.136]
- [10] Xi L., 2019, P HEIL HIGH ED SOC E, P164