[1]国家互联网应急中心.CNCERT互联网安全威胁报告——2018年2月[EB/OL].[2018-03-02].http://www.cert.org.cn/publish/main/upload/File/2018mon thly02.pdf.
[2]GUANG G,GENG X T,YANG W W,et al.A taxonomy of hyperlink hiding techniques[M].Berlin,Germany:Springer International Publishing,2014.
[3]邢容.基于文本识别技术的网页恶意代码检测方法研究[D].北京:中国科学院大学,2012.
[4]孟池洁,王伟,耿光刚.基于统计机器学习的互联网暗链检测方法[J].计算机应用研究,2015,32(9):2779-2783.
[5]杨望,董国伟,龚俭,等.基于机器学习的网页黑链检测算法[C]//第七届信息安全漏洞分析与风险评估大会论文集.南京:东南大学出版社,2014:416-423.
[6]PAGE L.The PageRank citation ranking:Bringing order to the web[J].Stanford Digital Libraries Working Paper,1998,9(1):1-14.
[7]QUINLAN J R.Decision trees and decision-making[J].IEEE Transactions on Systems,Man,and Cybernetics,1990,20(2):339-346.
[8]周恺,苏娟.基于概率提升树的虹膜分割算法[J].计算机工程,2017,43(8):249-252,257.
[9]MANNA S,BISWAS S,KUNDU R,et al.A statistical approach to predict flight delay using gradient boosted decision tree[C]//Proceedings of International Conference on Computational Intelligence in Data Science.Gurugram,India:The NorthCap University Press,2017:1-5.
[10]CHIHAB Y,OUHMAN A A,ERRITALI M,et al.Detection & classification of internet intrusion based on the combination of random forest and nave bayes[J].International Journal of Engineering & Technology,2013,5(3):2116-2126.
[11]董兰芳,张军挺.基于深度学习与随机森林的人脸年龄与性别分类研究[J].计算机工程,2018,44(5):246-251.
[12]SUN J Y.JIEBA Chinese text segmentation[EB/OL].[2018-03-02].https://github.com/fxsjy/jieba.
[13]FAKHRAEI S,SOLTANIAN-ZADEH H,FOTOUHI F.Bias and stability of single variable classifiers for feature ranking and selection[J].Expert Systems with Applications,2014,41(15):6945-6958.
[14]贾周阳,廖湘科,刘晓东,等.基于机器学习的日志函数自动识别方法[J].计算机工程与科学,2017,39(1):111-117.
[15]HAMMERLA N Y,HALLORAN S,PLOETZ T.Deep,convolutional,and recurrent models for human activity recognition using wearables[J].Journal of Scientific Computing,2016,61(2):454-476.
|