Author:
Li Yang,Liu Xiaohua,Zhang Lixin,Guo Wenbin,Guo Qian
Publisher
Springer International Publishing
Reference29 articles.
1. Hu, R.: Key technology for big visual data analysis in security space and its applications. In: 2016 International Conference on Advanced Cloud and Big Data (CBD), vol. 3, no. 4, p. 333 (2016)
2. Yu, J., Wang, K., Li, P., Xia, R., Guo, S., Guo, M.: Efficient trustworthiness management for malicious user detection in big data collection. In: IEEE Transactions on Big Data, October 2017
3. Albu, A.: From logical inference to decision trees in medical diagnosis. In: E-Health and Bioengineering Conference (EHB). Sinaia 2017, 65–68 (2017)
4. Park, K.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In: 2018 ACM SIGCOMM Computer Communication Review, December 2018
5. laski, J., Stanley, W.: Software verification and analysis. In: 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), Springer, London (2018)
https://doi.org/10.1007/978-1-84882-240-5