共 3 条
[2]
Filtering intrusion detection alarms
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2010, 13 (01)
:19-29
[3]
Constrained K-means Clustering with Background Knowledge .2 Wagstaff K,Cardie C,Rogers S,et al. Proceedings of the Eighteenth International Conference on Machine Learning . 2001