共 15 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Blasing T, 2012, P 2010 5 INTERNATION, P55
[3]
Dempster AP, 2008, STUD FUZZ SOFT COMP, V219, P57
[4]
Enck W., 2010, P 9 USENIX C OP SYST, DOI DOI 10.1145/2494522
[5]
Gascon H., 2013, P ACM WORKSH ART INT, P45
[6]
Sahs J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P141, DOI 10.1109/EISIC.2012.34
[8]
Sarma B. P., 2012, S ACC CONTR MOD TECH, DOI [10.1145/2295136.2295141, DOI 10.1145/2295136.2295141]
[9]
Shabtai A., 2010, Proceedings 2010 International Conference on Computational Intelligence and Security (CIS 2010), P329, DOI 10.1109/CIS.2010.77
[10]
Shafer G., 1976, A Mathematical Theory of Evidence, DOI 10.2307/1268172

