共 50 条
- [3] Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 160 - 167
- [4] Visual Integration of Meteorological and Sensor Data for Identifying Suspicious Company Behavior 2017 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2017, : 225 - 226
- [6] Visual Analysis of Implicit Social Networks for Suspicious Behavior Detection DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT II, 2011, 6588 : 388 - +
- [9] Detecting Suspicious Following Behavior in Multimillion-Node Social Networks WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 305 - 306