Author:
Meyer Tobias,Priesterjahn Claudia,Sextro Walter
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Albers, A.: Five Hypotheses about Engineering Processes and their Consequences. In: Proceedings of the 8th International Symposium on Tools and Methods of Competitive, Ancona, IT (2010)
2. Alpaydın, E.: Introduction to Machine Learning. The MIT Press (2004)
3. Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004), doi:10.1109/TDSC.2004.2
4. Bender, K.: Embedded Systems – Qualitätsorientierte Entwicklung. Springer, Berlin (2005), doi:10.1007/b138984
5. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. (2009), doi:10.1145/1541880.1541882