暂无分享,去创建一个
Qin Lin | Sicco Verwer | Xiaoran Liu | Dmitri Jarnikov | D. Jarnikov | S. Verwer | Xiaoran Liu | Qin Lin
[1] Francesco Palmieri,et al. On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines , 2013, Appl. Soft Comput..
[2] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Li Wei,et al. Experiencing SAX: a novel symbolic representation of time series , 2007, Data Mining and Knowledge Discovery.
[4] Tim Oates,et al. Time series anomaly discovery with grammar-based compression , 2015, EDBT.
[5] Cees Witteveen,et al. A Likelihood-Ratio Test for Identifying Probabilistic Deterministic Real-Time Automata from Positive Data , 2010, ICGI.
[6] Hans Kleine Büning,et al. Model-Based Anomaly Detection for Discrete Event Systems , 2014, 2014 IEEE 26th International Conference on Tools with Artificial Intelligence.
[7] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.