相似文献/References:
[1]孟宪苹 宋菲 李俊.基于序列模式挖掘的入侵检测系统的研究[J].计算机技术与发展,2008,(03):154.
MENG Xian-ping,SONG Fei,LI Jun.Research of Intrusion Detection System Based on Sequential Pattern Mining[J].,2008,(01):154.
[2]叶和平 尚敏.一种面向入侵检测的数据挖掘算法研究[J].计算机技术与发展,2008,(11):149.
YE He-ping,SHANG Min.Study on an Intrusion Detection Oriented Data Mining Algorithm[J].,2008,(01):149.
[3]夏明波 王晓川 孙永强 金士尧.序列模式挖掘算法研究[J].计算机技术与发展,2006,(04):4.
XIA Ming-bo,WANG Xiao-chuan,SUN Yong-qiang,et al.Research on Sequential Pattern Mining Algorithms[J].,2006,(01):4.
[4]刘洪辉 吴岳芬.用户行为模式挖掘问题的研究[J].计算机技术与发展,2006,(05):50.
LIU Hong-hui,WU Yue-fen.Research on User's Behavior Pattern Mining[J].,2006,(01):50.
[5]卢博礼 张小平 王翰虎.基于矩阵算法的序列模式挖掘研究[J].计算机技术与发展,2011,(01):120.
LU Bo-li,ZHANG Xiao-ping,WANG Han-hu.Research on Sequential Pattern Mining Based on Algorithm of Matrix[J].,2011,(01):120.
[6]李全. 适用于协议特征提取的多级T+序列树挖掘算法[J].计算机技术与发展,2015,25(10):71.
LI Quan. Mining Algorithm Based on Multilevel T+ Sequence Tree for Protocol Signatures Extracting[J].,2015,25(01):71.
[7]夏达,李士进.水质时间序列模式挖掘[J].计算机技术与发展,2018,28(05):149.[doi:10.3969/j.issn.1673-629X.2018.05.034]
XIA Da,LI Shijin.Pattern Mining for Water Quality Time Series[J].,2018,28(01):149.[doi:10.3969/j.issn.1673-629X.2018.05.034]