Author:
Wang Yuhan,Yi Qian,Yi Shuping,Li Jiajia,Xiong Shiquan
Publisher
Springer International Publishing
Reference21 articles.
1. Zhao, G., Gong, Y.S., Wang, D.L.: Information security risk analysis model considering costs and factors relevance. J. Shenyang Univ. Technol. 37(1), 69–74 (2015)
2. Pierrot, D., Harbi, N., Darmont, J.: Hybrid intrusion detection in information systems. In: International Conference on Information Science & Security. IEEE (2017)
3. Cheng, Y., Miao, Y.C., Tan, P.F., et al.: Research on mining and detection method of abnormal learning behavior. In: International Conference on Information System and Artificial Intelligence (ISAI). IEEE (2016)
4. Chen, L., Zhou, Y., Chiu, D.M.: A study of user behavior in online VoD services. Comput. Commun. 46, 66–75 (2016)
5. Ajzen, I., Fishbein, M.: Attitude-behavior relations: a theoretical analysis and review of empirical research. Psychol. Bull. 84(5), 888 (1977)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献