共 50 条
- [2] Detecting Malicious Tweets in Trending Topics using Clustering and Classification [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
- [3] Detecting Malicious URLs Using Lexical Analysis [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 467 - 482
- [4] Detecting and verifying dissimilar patterns in unlabelled data [J]. SOFT COMPUTING: METHODOLOGIES AND APPLICATIONS, 2005, : 247 - 258
- [5] Outlier Detection for Categorial Data Using Clustering Algorithms [J]. COMPUTATIONAL SCIENCE - ICCS 2022, PT III, 2022, 13352 : 714 - 727
- [6] A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering [J]. 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 307 - 318
- [7] Detecting Malicious Domains by Massive DNS Traffic Data Analysis [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL. 1, 2016, : 130 - 133
- [8] Analysis of Flight Data Using Clustering Techniques for Detecting Abnormal Operations [J]. JOURNAL OF AEROSPACE INFORMATION SYSTEMS, 2015, 12 (09): : 587 - 598
- [9] Outlier Detection in Data Streams Using Various Clustering Approaches [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 690 - 693
- [10] Unsupervised Outlier Detection in Streaming Data Using Weighted Clustering [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 947 - 952