共 50 条
- [41] Optimal Byzantine Attacks on Distributed Detection in Tree-based Topologies 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
- [43] DECKARD: Scalable and accurate tree-based detection of code clones ICSE 2007: 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2007, : 96 - +
- [44] A weighted decision tree-based fast intrusion detection model IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 115 - 120
- [45] INTELLIGENT TREE-BASED ENSEMBLE APPROACHES FOR PHISHING WEBSITE DETECTION JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (01): : 563 - 582
- [47] Tree-based Intelligent Intrusion Detection System in Internet of Vehicles 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
- [48] STREAMRHF: Tree-Based Unsupervised Anomaly Detection for Data Streams 2022 IEEE/ACS 19TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2022,
- [49] Graph Partitioning Change Detection Using Tree-Based Clustering 2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2013, : 1169 - 1174
- [50] A parse tree-based NoSQL injection attacks detection mechanism Wu, Tsu-Yang (wutsuyang@gmail.com), 2017, Ubiquitous International (08):