
[Terrorism, Security, and Computation] Anomaly Detection Principles and Algorithms || Anomaly Detection
Mehrotra, Kishan G., Mohan, Chilukuri K., Huang, HuaMingVolume:
10.1007/97
Année:
2017
Langue:
english
DOI:
10.1007/978-3-319-67526-8_2
Fichier:
PDF, 122 KB
english, 2017