1 |
Matthias Scheutz, Virgil Andronache "Archiectural Mechanisms for Dynamic Changes of Behavior Selection Strategies in Behavior-Based Systems", Transactions on systems, man, and cybernetics-Part B:Cybernetics, Vol.34, No.6, December 2004
|
2 |
Adrian P.Lauf, Richard A.Peters, William H.Robinson "Embadded Intelligent Intrusion Detection: A Behavior-Based Approach", 21st International Conference on Advanced Information Networking and Applications Workshops(AINAW'07)
|
3 |
Nam-Yeol Park, Yong-Min Kim, Bong-Nam Noh"A Behavior based Detection for Malicious Code Using Obfuscation Technique", 2006.6
|
4 |
Wenguang Chai "Analyzes and Solves Top Enterprise Network Data Security Issues with the Web Data Mining Technology" 2009 First International Workshop on Database Technology and Applications
|
5 |
Lianying Zhou, Fengyu Liu, "Research on Computer Network Security Based on Pattern Recognition", 2003
|
6 |
Li Peng, Teng Wen-Da, Zheng Wei, Zhang Kai-Hui "Formalized Answer Extraction Technology Based on Pattern Learning" IFOST 2010 Proceedings 2010
|
7 |
Shreeranga P.R., Akshat Vig, Dr. V.S.Ananth Narayana "An Efficient Classification Algorithm based on Pattern Range Tree Prototypes", 10th International Conference on Information Technology 2007
|