The Obfuscation Method of User Identification System
暂无分享,去创建一个
[1] Jaideep Srivastava,et al. Data Preparation for Mining World Wide Web Browsing Patterns , 1999, Knowledge and Information Systems.
[2] Hongjun Lu,et al. Cut-and-Pick Transactions for Proxy Log Mining , 2002, EDBT.