暂无分享,去创建一个
[1] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[2] U. Fayyad. On the induction of decision trees for multiple concept learning , 1991 .
[3] Hsuan-Tien Lin,et al. A note on Platt’s probabilistic outputs for support vector machines , 2007, Machine Learning.
[4] Nello Cristianini,et al. An introduction to Support Vector Machines , 2000 .
[5] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[6] Bernhard Plattner,et al. Firefox (In) security update dynamics exposed , 2008, CCRV.
[7] Stefan Frei,et al. Why Silent Updates Boost Security , 2009 .
[8] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[9] A. Atiya,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.