-
1
-
-
0000492326
-
Learning from noisy examples
-
D. Angluin and P. Laird. Learning from noisy examples. Machine Learning, 2(4):434-470, 1988.
-
(1988)
Machine Learning
, vol.2
, Issue.4
, pp. 434-470
-
-
Angluin, D.1
Laird, P.2
-
2
-
-
0346044653
-
Learning nested differences in the presence of malicious noise
-
PII S0304397597000194
-
P. Auer. Learning nested differences in the presence of malicious noise. Theoretical Computer Science, 185(1):159-175, 1997. (Pubitemid 127452836)
-
(1997)
Theoretical Computer Science
, vol.185
, Issue.1
, pp. 159-175
-
-
Auer, P.1
-
3
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Recent Adances in Intrusion Detection (RAID), pages 178-197, 2007.
-
(2007)
Recent Adances in Intrusion Detection (RAID), pages 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
4
-
-
33845989821
-
Can machine learning be secure
-
M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. Tygar. Can machine learning be securě In ACM Symposium on Information, Computer and Communication Security, pages 16-25, 2006.
-
(2006)
ACM Symposium on Information, Computer and Communication Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.4
Tygar, J.5
-
5
-
-
70349235375
-
Open problems in the security of learning
-
New York, NY, USA, ACM
-
M. Barreno, P. L. Bartlett, F. J. Chi, A. D. Joseph, B. Nelson, B. I. Rubinstein, U. Saini, and J. D. Tygar. Open problems in the security of learning. In AISec '08: Proceedings of the 1st ACM workshop on Workshop on AISec, pages 19-26, New York, NY, USA, 2008. ACM.
-
(2008)
AISec '08: Proceedings of the 1st ACM workshop on Workshop on AISec
, pp. 19-26
-
-
Barreno, M.1
Bartlett, P.L.2
Chi, F.J.3
Joseph, A.D.4
Nelson, B.5
Rubinstein, B.I.6
Saini, U.7
Tygar, J.D.8
-
6
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. D. Joseph, and J. D. Tygar. The security of machine learning. Machine Learning, 81(2):121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
7
-
-
0026966646
-
Training algorithm for optimal margin classifiers
-
B. Boser, I. Guyon, and V. Vapnik. A training algorithm for optimal margin classifiers. In D. Haussler, editor, Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, pages 144-152, 1992. (Pubitemid 23615470)
-
(1992)
Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory
, pp. 144-152
-
-
Boser Bernhard, E.1
Guyon Isabelle, M.2
Vapnik Vladimir, N.3
-
10
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
G. Cretu, A. Stavrou, M. Locasto, S. Stolfo, and A. Keromytis. Casting out demons: Sanitizing training data for anomaly sensors. In Proc. of IEEE Symposium on Security and Privacy, pages 81-95, 2008.
-
(2008)
Proc. of IEEE Symposium on Security and Privacy
, pp. 81-95
-
-
Cretu, G.1
Stavrou, A.2
Locasto, M.3
Stolfo, S.4
Keromytis, A.5
-
11
-
-
76649108863
-
Adaptive anomaly detection via self-calibration and dynamic updating
-
G. F. Cretu-Ciocarlie, A. Stavrou, M. E. Locasto, and S. J. Stolfo. Adaptive anomaly detection via self-calibration and dynamic updating. In Recent Adances in Intrusion Detection (RAID), pages 41-60, 2009.
-
(2009)
Recent Adances in Intrusion Detection (RAID)
, pp. 41-60
-
-
Cretu-Ciocarlie, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
-
12
-
-
12244295760
-
-
ACM Press
-
N. Dalvi, P. Domingos, M. Sumit, and S. D. Verma. Adversarial classification. In In KDD, pages 99-108. ACM Press, 2004.
-
(2004)
Adversarial Classification KDD
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Sumit, M.3
Verma, S.D.4
-
14
-
-
84873415283
-
Learning to classify with missing and corrupted features
-
O. Dekel, O. Shamir, and L. Xiao. Learning to classify with missing and corrupted features. Machine Learning, 2009.
-
(2009)
Machine Learning
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
15
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In ACM Conference on Computer and Communications Security, pages 59-68, 2006. (Pubitemid 47131356)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
16
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, andW. Lee. Polymorphic blending attacks. In Proc. of USENIX Security Symposium, pages 241-256, 2006.
-
(2006)
Proc. of USENIX Security Symposium
, pp. 241-256
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
17
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, USA
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff. A sense of self for unix processes. In Proc. of IEEE Symposium on Security and Privacy, pages 120-128, Oakland, CA, USA, 1996.
-
(1996)
Proc. of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
19
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
20
-
-
0027640858
-
Learning in the presence of malicious errors
-
M. Kearns and M. Li. Learning in the presence of malicious errors. SIAM Journal on Computing, 22(4):807-837, 1993. (Pubitemid 23677152)
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 807-837
-
-
Kearns Michael1
Li Ming2
-
21
-
-
74049158178
-
A framework for quantitative security analysis of machine learning
-
D. Balfanz and J. Staddon, editors ISBN 978-1-60558-781-783
-
P. Laskov and M. Kloft. A framework for quantitative security analysis of machine learning. In D. Balfanz and J. Staddon, editors, AISec, pages 1-4. ACM, 2009. ISBN 978-1-60558-781-3.
-
(2009)
AISec ACM
, pp. 1-4
-
-
Laskov, P.1
Kloft, M.2
-
22
-
-
85016684916
-
Intrusion detection in unlabeled data with quarter-sphere support vector machines
-
P. Laskov, C. Scȟafer, and I. Kotenko. Intrusion detection in unlabeled data with quarter-sphere support vector machines. In Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of DIMVA Conference, pages 71-82, 2004a.
-
(2004)
Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of DIMVA Conference
, pp. 71-82
-
-
Laskov, P.1
Scȟafer, C.2
Kotenko, I.3
-
23
-
-
33745162710
-
Praxis der Informationsverarbeitung und Kommunikation
-
P. Laskov, C. Scȟafer, I. Kotenko, and K.-R. M̌uller. Intrusion detection in unlabeled data with quarter-sphere support vector machines (extended version). Praxis der Informationsverarbeitung und Kommunikation, 27:228-236, 2004b.
-
(2004)
Intrusion detection in unlabeled data with quarter-sphere support vector machines (extended version)
, vol.27
, pp. 228-236
-
-
Laskov, P.1
Scȟafer, C.2
Kotenko, I.3
M̌uller, K.-R.4
-
24
-
-
33745777639
-
Incremental support vector learning: Analysis, implementation and applications
-
P. Laskov, C. Gehl, S. Kr ̌uger, and K. R. M̌uller. Incremental support vector learning: Analysis, implementation and applications. Journal of Machine Learning Research, 7:1909-1936, Sept. 2006. (Pubitemid 44477117)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 1909-1936
-
-
Laskov, P.1
Gehl, C.2
Kruger, S.3
Muller, K.-R.4
-
25
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava. A comparative study of anomaly detection schemes in network intrusion detection. In Proc. of SIAM International Conference on Data Mining (SDM), 2003.
-
(2003)
Proc. of SIAM International Conference on Data Mining (SDM)
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
26
-
-
0036358995
-
The spectrum kernel: A string kernel for svm protein classification
-
C. Leslie, E. Eskin, and W. Noble. The spectrum kernel: A string kernel for SVM protein classification. In Proc. Pacific Symp. Biocomputing, pages 564-575, 2002.
-
(2002)
Proc. Pacific Symp. Biocomputing
, pp. 564-575
-
-
Leslie, C.1
Eskin, E.2
Noble, W.3
-
27
-
-
33751064824
-
-
IEEE Security and Privacy
-
Z. Li, M. Sandhi, Y. Chen, M.-Y. Kao, and B. Chavez. Hamsa: fast signature generation for zeroday polymorphic worms with provable attack resilience. In IEEE Security and Privacy, pages 32-47, 2006.
-
(2006)
Hamsa: Fast Signature Generation For Zeroday Polymorphic Worms With Provable Attack Resilience
, pp. 32-47
-
-
Li, Z.1
Sandhi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
28
-
-
34250091945
-
Learning quickly when irrelevant attributes abound: A new linear threshold algorithm
-
N. Littlestone. Learning quickly when irrelevant attributes abound: A new linear threshold algorithm. Machine Learning, 2:285-318, 1988.
-
(1988)
Machine Learning
, vol.2
, pp. 285-318
-
-
Littlestone, N.1
-
31
-
-
0142063407
-
Novelty detection: A review - Part 1: Statistical approaches
-
M. Markou and S. Singh. Novelty detection: a review - part 1: statistical approaches. Signal Processing, 83:2481-2497, 2003a.
-
(2003)
Signal Processing
, vol.83
, pp. 2481-2497
-
-
Markou, M.1
Singh, S.2
-
32
-
-
0142126712
-
Novelty detection: A review - Part 2: Neural network based approaches
-
M. Markou and S. Singh. Novelty detection: a review - part 2: neural network based approaches. Signal Processing, 83:2499-2521, 2003b.
-
(2003)
Signal Processing
, vol.83
, pp. 2499-2521
-
-
Markou, M.1
Singh, S.2
-
33
-
-
34250103140
-
On solving a linear program with one quadratic constraint
-
L. Martein and S. Schaible. On solving a linear program with one quadratic constraint. Decisions in Economics and Finance, 10:75-90, 2005.
-
(2005)
Decisions in Economics and Finance
, vol.10
, pp. 75-90
-
-
Martein, L.1
Schaible, S.2
-
34
-
-
84873431125
-
Microsoft. Microsoft security intelligence report: January to
-
June
-
Microsoft. Microsoft security intelligence report: January to June 2008. Microsoft Corporation, 2008.
-
(2008)
Microsoft Corporation
-
-
-
35
-
-
77949498582
-
Stability bounds for stationary φ-mixing and β-mixing
-
March 2010 ISSN
-
M.Mohri and A. Rostamizadeh. Stability bounds for stationary φ-mixing and β-mixing processes. J. Mach. Learn. Res., 11:789-814, March 2010. ISSN 1532-4435. URL http: //portal.acm.org/citation. cfmid=1756006.1756032.
-
Processes. J. Mach. Learn. Res
, vol.11
, pp. 1532-4435
-
-
Mohri, M.1
Rostamizadeh, A.2
-
37
-
-
0035272287
-
An introduction to kernel-based learning algorithms
-
DOI 10.1109/72.914517, PII S1045922701037146
-
K.-R. M̌uller, S. Mika, G. Řatsch, K. Tsuda, and B. Scȟolkopf. An introduction to kernel-based learning algorithms. IEEE Neural Networks, 12(2):181-201, May 2001. (Pubitemid 32371478)
-
(2001)
IEEE Transactions on Neural Networks
, vol.12
, Issue.2
, pp. 181-201
-
-
Muller, K.-R.1
Mika, S.2
Ratsch, G.3
Tsuda, K.4
Scholkopf, B.5
-
38
-
-
84873471384
-
A system for the analysis fo jet vibration data
-
A. Nairac, T. N., R. Carr, S. King, P. Cowley, and L. Tarassenko. A system for the analysis fo jet vibration data. Integrated Computer-Aided Engineering, 1999.
-
(1999)
Integrated Computer-Aided Engineering
-
-
Nairac, A.1
Carr, R.2
King, S.3
Cowley, P.4
Tarassenko, L.5
-
40
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
B. Nelson, M. Barreno, F. Chi, A. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. Tygar, and K. Xia. Exploiting machine learning to subvert your spam filter. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), 2008.
-
(2008)
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08)
-
-
Nelson, B.1
Barreno, M.2
Chi, F.3
Joseph, A.4
Rubinstein, B.5
Saini, U.6
Sutton, C.7
Tygar, J.8
Xia, K.9
-
41
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In Recent Adances in Intrusion Detection (RAID), pages 81-105, 2006. (Pubitemid 44617848)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
42
-
-
0001473437
-
On estimation of probability density function and mode
-
E. Parzen. On estimation of probability density function and mode. Annals of Mathematical Statistics, 33:1065-1076, 1962.
-
(1962)
Annals of Mathematical Statistics
, vol.33
, pp. 1065-1076
-
-
Parzen, E.1
-
43
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
DOI 10.1109/SP.2006.26, 1623998, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proc. of IEEE Symposium on Security and Privacy, pages 17-31, 2006. (Pubitemid 44753709)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Foglat, P.4
Sharif, M.5
-
44
-
-
0001030653
-
Measuring mass concentration and estimating density contour clusters - An excess mass approach
-
W. Polonik. Measuring mass concentration and estimating density contour clusters - an excess mass approach. Annals of Statistics, 23:855-881, 1995.
-
(1995)
Annals of Statistics
, vol.23
, pp. 855-881
-
-
Polonik, W.1
-
45
-
-
38549109147
-
Quarter sphere based distributed anomaly detection in wireless sensor networks
-
DOI 10.1109/ICC.2007.637, 4289308, 2007 IEEE International Conference on Communications, ICC'07
-
S. Rajasegarar, C. Leckie,M. Palaniswami, and J. Bezdek. Quarter sphere based distributed anomaly detection in wireless sensor networks. In IEEE International Conference on Communications (ICC), pages 3864-3869, 2007. (Pubitemid 351146132)
-
(2007)
IEEE International Conference on Communications
, pp. 3864-3869
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
Bezdek, J.C.4
-
46
-
-
33746430492
-
Detecting unknown network attacks using language models
-
Detection of Intrusions and Malware and Vulnerability Assessment - Third International Conference, DIMVA 2006, Proceedings
-
K. Rieck and P. Laskov. Detecting unknown network attacks using language models. In Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of 3rd DIMVA Conference, LNCS, pages 74-90, July 2006. (Pubitemid 44124003)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4064
, pp. 74-90
-
-
Rieck, K.1
Laskov, P.2
-
47
-
-
33846910249
-
Language models for detection of unknown attacks in network traffic
-
K. Rieck and P. Laskov. Language models for detection of unknown attacks in network traffic. Journal in Computer Virology, 2(4):243-256, 2007.
-
(2007)
Journal in Computer Virology
, vol.2
, Issue.4
, pp. 243-256
-
-
Rieck, K.1
Laskov, P.2
-
48
-
-
38949156579
-
Linear-time computation of similarity measures for sequential data
-
Jan
-
K. Rieck and P. Laskov. Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research, 9(Jan):23-48, 2008.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
49
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Ďussel, and P. Laskov. Learning and classification of malware behavior. In Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of 5th DIMVA Conference, LNCS, pages 108-125, 2008.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of 5th DIMVA Conference, LNCS
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Ďussel, P.4
Laskov, P.5
-
51
-
-
0347243182
-
Nonlinear Component Analysis as a Kernel Eigenvalue Problem
-
B. Scȟolkopf, A. Smola, and K.-R. M̌uller. Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 10:1299-1319, 1998. (Pubitemid 128463674)
-
(1998)
Neural Computation
, vol.10
, Issue.5
, pp. 1299-1319
-
-
Scholkopf, B.1
Smola, A.2
Muller, K.-R.3
-
52
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
DOI 10.1162/089976601750264965
-
B. Scȟolkopf, J. Platt, J. Shawe-Taylor, A. Smola, and R. Williamson. Estimating the support of a high-dimensional distribution. Neural Computation, 13(7):1443-1471, 2001. (Pubitemid 33595028)
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
55
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Y. Song, M. Locasto, A. Stavrou, A. Keromytis, and S. Stolfo. On the infeasibility of modeling polymorphic shellcode. In Conference on Computer and Communications Security (CCS), pages 541-551, 2007.
-
(2007)
Conference on Computer and Communications Security (CCS)
, pp. 541-551
-
-
Song, Y.1
Locasto, M.2
Stavrou, A.3
Keromytis, A.4
Stolfo, S.5
-
57
-
-
55049121775
-
Learning from dependent observations
-
January . ISSN 0047-259X
-
I. Steinwart, D. Hush, and C. Scovel. Learning from dependent observations. J. Multivar. Anal., 100:175-194, January 2009. ISSN 0047-259X.
-
(2009)
J. Multivar. Anal
, vol.100
, pp. 175-194
-
-
Steinwart, I.1
Hush, D.2
Scovel, C.3
-
59
-
-
84873469848
-
-
Symantec. Symantex report on the underground economy: July 07 to June 08. Symantec Corporation
-
Symantec. Symantex report on the underground economy: July 07 to June 08. Symantec Corporation, 2008.
-
(2008)
-
-
-
60
-
-
0001986205
-
Data domain description by support vectors
-
M. Verleysen, editor Brussels, . D. Facto Press
-
D. Tax and R. Duin. Data domain description by support vectors. In M. Verleysen, editor, Proc. ESANN, pages 251-256, Brussels, 1999a. D. Facto Press.
-
(1999)
Proc. ESANN
, pp. 251-256
-
-
Tax, D.1
Duin, R.2
-
61
-
-
0033220728
-
Support vector domain description
-
DOI 10.1016/S0167-8655(99)00087-2
-
D. Tax and R. Duin. Support vector domain description. Pattern Recognition Letters, 20(11-13): 1191-1199, 1999b. (Pubitemid 32261897)
-
(1999)
Pattern Recognition Letters
, vol.20
, Issue.11-13
, pp. 1191-1199
-
-
Tax, D.M.J.1
Duin, R.P.W.2
-
62
-
-
0031478562
-
On nonparametric estimation of density level sets
-
A. Tsybakov. On nonparametric estimation of density level sets. Annals of Statistics, 25:948-969, 1997.
-
(1997)
Annals of Statistics
, vol.25
, pp. 948-969
-
-
Tsybakov, A.1
-
63
-
-
22044451539
-
Programming with a quadratic constraint
-
C. van de Panne. Programming with a quadratic constraint. Management Science, 12:798-815, 1966.
-
(1966)
Management Science
, vol.12
, pp. 798-815
-
-
Van De Panne, C.1
-
65
-
-
33646554819
-
Consistency and convergence rates of one-class svms and related algorithms
-
December ISSN 1532-4435
-
R. Vert and J.-P. Vert. Consistency and convergence rates of one-class svms and related algorithms. J. Mach. Learn. Res., 7:789-814, December 2006. ISSN 1532-4435.
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 789-814
-
-
Vert, R.1
Vert, J.-P.2
-
68
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
K. Wang, J. Parekh, and S. Stolfo. Anagram: A content anomaly detector resistant to mimicry attack. In Recent Adances in Intrusion Detection (RAID), pages 226-248, 2006. (Pubitemid 44617855)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
|