相似文献/References:
[1]王军豪 彭岩.基于主观贝叶斯的点击流数据分析应用研究[J].计算机技术与发展,2008,(07):116.
WANG Jun-hao,PENG Yan.Application and Research of Clickstream Data Analysis Based on Bayes[J].,2008,(02):116.
[2]高志森 张铮 李俊.入侵检测中贝叶斯分类器改进的研究[J].计算机技术与发展,2006,(11):154.
GAO Zhi-sen,ZHANG Zheng,LI Jun.Improved Bayesian Classifier of Intrusion Detection[J].,2006,(02):154.
[3]江欢 汤进 郭玉堂 罗斌.基于t混合模型的自动图像标注[J].计算机技术与发展,2010,(10):86.
JIANG Huan,TANG Jin,GUO Yu-tang,et al.Automatic Image Annotation Based on t Mixture Model[J].,2010,(02):86.
[4]曾永忠[] []张帅[] 马忠权[]. 一种基于用户会话的异常检测方法[J].计算机技术与发展,2014,24(07):141.
ZENG Yong-zhong[][],ZHANG Shuai[] A Zhong-quan[]. An Anomaly Detection Method Based on Session[J].,2014,24(02):141.
[5]裴向杰,唐红昇,陈鹏. 一种改进的贝叶斯算法在短信过滤中的研究[J].计算机技术与发展,2015,25(09):89.
PEI Xiang-jie,TANG Hong-sheng,CHEN Peng. Research on Optimized Naive Bayesian Algorithm in SMS Spam Filtering[J].,2015,25(02):89.
[6]刘思聪,郑日忠,张启坤,等.基于堆结构的域间访问控制模型[J].计算机技术与发展,2018,28(02):130.[doi:10.3969/j.issn.1673-629X.2018.02.028]
LIU Sicong,ZHENG izhong,ZHANG Qikun,et al.Inter-domain Access Control Model Based on Heap Structure[J].,2018,28(02):130.[doi:10.3969/j.issn.1673-629X.2018.02.028]
[7]王有远[],张乐恩[]. 基于情境感知的设计资源服务需求获取研究[J].计算机技术与发展,2017,27(05):10.
WANG You-yuan[],ZHANG Le-en[]. Investigation on Acquisition of Designing Resources ServiceRequirements with Context Awareness[J].,2017,27(02):10.
[8]马荟平,李 鹏,肖 航,等.基于贝叶斯攻击图的 RFID 系统安全评估模型[J].计算机技术与发展,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]
MA Hui-ping,LI Peng,XIAO Hang,et al.RFID System Security Evaluation Model Based on Bayesian Attack Graph[J].,2024,34(02):113.[doi:10. 3969 / j. issn. 1673-629X. 2024. 02. 017]