Funder
Defense Acquisition Program Administration
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference46 articles.
1. Mining malicious corruption of data with hidden Markov models;Barbara;Res. Dir. Data Appl. Secur.,2003
2. Random search for hyper-parameter optimization;Bergstra;J. Mach. Learn. Res.,2012
3. Accuracy-based learning classifier systems: models, analysis and applications to classification tasks;Bernado-Mansilla;Evol. Comput.,2003
4. Database security-concepts, approaches and challenges;Bertino;IEEE Trans. Dependable Secure Comput.,2005
5. Intrusion detection in RBAC-administered databases;Bertino,2005
Cited by
64 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献