Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference41 articles.
1. Developing an approach to evaluate stocks by forecasting effective features with data mining methods;Barak;Expert Systems with Applications,2015
2. Usability meets access control: challenges and research opportunities;Beznosov,2009
3. Network anomaly detection: Methods, systems and tools;Bhuyan;IEEE Communications Surveys Tutorials,2014
4. Intentional access management: making access control usable for end-users;Cao,2006
5. An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection;Catania;Expert Systems with Applications,2012
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献