共 50 条
- [1] Mining and modeling database user access patterns FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2006, 4203 : 493 - 503
- [2] Characterizing User Access Behaviors in Mobile TV System 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 2093 - 2097
- [3] Characterizing sequences of user actions for access logs analysis USER MODELING 2001, PROCEEDINGS, 2001, 2109 : 228 - 230
- [4] Characterizing user access to videos on the world wide web MULTIMEDIA COMPUTING AND NETWORKING 2000, 2000, 3969 : 130 - 141
- [5] Anomaly detection of access patterns in database 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1112 - 1115
- [6] Database Access and Patterns in Erlang/OTP PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 73 - +
- [7] VIEWDATA SYSTEMS - DESIGNING A DATABASE FOR EFFECTIVE USER ACCESS CANADIAN JOURNAL OF INFORMATION SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION, 1981, 6 (JUN): : 1 - 14
- [8] Characterizing Video Access Patterns in Mainstream Media Portals PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 1085 - 1092
- [9] Characterizing Service Access Patterns under Heterogeneous Clients 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2020), 2020, : 57 - 59
- [10] Detecting Intruders by User File Access Patterns NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 320 - 335