共 35 条
[2]
Ballard DH., 1987, AAAI, V647, P279
[3]
Bojarski M, 2016, Arxiv, DOI arXiv:1604.07316
[4]
Bromley J., 1993, International Journal of Pattern Recognition and Artificial Intelligence, V7, P669, DOI 10.1142/S0218001493000339
[5]
Devlin J, 2019, Arxiv, DOI arXiv:1810.04805
[6]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[7]
Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.160, 10.1109/ICDM.2016.0103]
[8]
Farzad A, 2021, Arxiv, DOI arXiv:1911.08744
[9]
Glasmachers T., 2017, PMLR, P17
[10]
Graves A, 2012, STUD COMPUT INTELL, V385, P1, DOI [10.1162/neco.1997.9.1.1, 10.1007/978-3-642-24797-2]