Author:
Kim Dong Seong,Park Jong Sou
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance, James P Anderson Co., Technical report, Fort Washington, Pennsylvania (April 1980)
2. Denning, D.E.: An Intrusion Detection Model. IEEE Trans. S.E. (1987)
3. Vapnik, V.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)
4. SVM Application List, http://www.clopinet.com/isabelle/Projects/SVM/applist.html
5. Burges, C.J.C.: A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery (1998)
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献