Author:
Kergl Dennis,Roedler Robert,Rodosek Gabi Dreo
Publisher
Springer International Publishing
Reference15 articles.
1. Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and Big Heterogeneous Data: a Survey, J. Big Data 2(1) (2015). doi:
10.1186/s40537-015-0013-4
,
http://www.journalofbigdata.com/content/2/1/3
2. Aoyama, T., Naruoka, H., Koshijima, I., Machii, W., Seki, K.: Control Conference (ASCC), 2015 10th Asian, pp. 1–4. IEEE (2015)
3. Yang, C.C., Tseng, S.S., Lee, T.J., Weng, J.F., Chen, K.: Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, ICALT 2012, pp. 121–123 (2012). doi:
10.1109/ICALT.2012.174
4. Seeber, S., Rodosek, G.D.: 10th International Conference on Network and Service Management (CNSM), 2014, pp. 376–381. IEEE (2014)
5. Lecture Notes in Computer Science,2015
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献