Release Time:2019-03-12 Hits:
Indexed by: Journal Article
Date of Publication: 2010-01-01
Journal: 情报学报
Included Journals: ISTIC、PKU
Issue: 7
Page Number: 45-57
Prev One:A Survey of Secure Software Development Application
Next One:Local Isolation Coefficient-Based Outlier Mining Algorithm