共 32 条
[1]
AMINI M, 2004, P 4 C ENG INT EIS 20
[2]
Bishop M., 2003, Computer security: art and science
[3]
BIVENS A, 2002, P ANNIE, V12
[4]
Bonifacio JM, 1998, IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, P205, DOI 10.1109/IJCNN.1998.682263
[5]
Cannady J., 1998, P 1998 NAT INF SYST, P443
[6]
CANNADY J, 2000, P IEEE INNS ENNS INT, V5, P405
[7]
COOLEN R, 2002, 49 RTO
[8]
Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
[9]
DEBAR H, 1992, P INT JOINT C NEUR N, V2, P478
[10]
Fausett L. V., 1993, FUNDAMENTALS NEURAL