共 81 条
[1]
Ahmed M., 2014, The state of the art in intrusion prevention and detection, P3
[2]
Ahmed M., 2015, ANN DATA SCI, V2, P111, DOI [10.1007/s40745-015-0035-y, DOI 10.1007/S40745-015-0035-Y]
[3]
Ahmed M, 2015, LECT NOTES I COMPUTE, V139, P61
[4]
A survey of anomaly detection techniques in financial domain
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 55
:278-288
[5]
Ahmed M, 2014, C IND ELECT APPL, P1780, DOI 10.1109/ICIEA.2014.6931456
[6]
Ahmed M, 2014, C IND ELECT APPL, P1141, DOI 10.1109/ICIEA.2014.6931337
[7]
Ahmed M, 2013, C IND ELECT APPL, P577
[9]
[Anonymous], 1980, MONOGRAPHS STAT APPL
[10]
[Anonymous], EAI ENDORSED T SCALA