参考文献/References:
[1] Han J W,Kamber M,Pei J.数据挖掘概念与技术 [M].3版.范明,译.北京:机械工业出版社,2012.
[2] 李川川,刘衍珩,田大新.基于序列模式的网络入侵检测系统 [J].吉林大学学报:工学版2007,37(1):121-125.
[3] 王令剑,滕少华.聚类和时间序列分析在入侵检测中的应用 [J].计算机应用,2010,30(3):699-701.
[4] Ren J M,JSR Jang.Discovering time-constrained sequential patterns for music genre classification [J].Audio,Speech,and Language Processing,2012,20(4):1134-1144.
[5] 俞东进,郑苏杭,李万清.基于多核并行的海量数据序列模式挖掘 [J].计算机应用研究,2012,29(2):478-481.
[6] Agrawal R,Sriaknt R,Mining sequential patterns[EB/OL].
[2012-09-17].http:∥rakesh.agrawal-family.com/papers/icde 95seq.pdf.
[7] 赵玉明,张巍,滕少华.数据挖掘技术在异常检测中的应用 [J].微型电脑应用,2007,23(5):16-17.
[8] Pei Jian,Han Jianwei,Behzad M A,et al.PrefixSpan:mining sequential patterns efficiently by prefix-projected pattern growth [EB/OL].
[2012-09-21].http:∥pdf.aminer.org/000/300/860/prefixspan_mining_sequential_patterns_by_prefix_projected_growth.pdf.
[9] Pei Jian,Han Jianwu.Mining sequential patterns by pattern-growth:the prefixSpan approach [J].IEEE Transactions on knowledge and data engineering,2004,16(11):1424-1440.
[10] Lin Cindy Xide,Ji Ming,Danilevsky M,et al.Efficient mining of correlated sequential patterns based on null hypothesis [EB/OL].
[2012-09-21].http:∥dl.acm.org/citation.cfm?id=2389656.2389660.
[11] 郭小芳,李锋,宋晓宁.一种基于PCA的时间序列异常检测方法 [J].江西师范大学学报:自然科学版,2012,36(3):280-283.
[12] 郭小芳,李锋,刘庆华.一种有效的多元时间序列相似性度量算法分析 [J].江西师范大学学报:自然科学版,2013,37(1):56-59.