共 30 条
- [1] Alon N., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P20, DOI 10.1145/237814.237823
- [3] [Anonymous], P 15 C USENIX SEC S
- [4] [Anonymous], 1984, OLSHEN STONE CLASSIF, DOI 10.2307/2530946
- [5] Dainotti A, 2009, LECT NOTES COMPUT SC, V5537, P64, DOI 10.1007/978-3-642-01645-5_8
- [6] Dorfinger P, 2011, LECT NOTES COMPUT SC, V6613, P164, DOI 10.1007/978-3-642-20305-3_14
- [7] Behavioral authentication of server flows [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 46 - 55
- [9] A comparison of methods for multiclass support vector machines [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2002, 13 (02): : 415 - 425