[1] |
娄伟. 云计算环境下用户信息安全策略研究[D]. 长春: 东北师范大学, 2013.Lou Wei. Research on User Information Security Strategy in Cloud Computing Environment[D]. Changchun: Northeast Normal University, 2013.
|
[2] |
Esposito M, Oliviero F, Mazzariello C, et al.Evaluating Pattern Recognition Techniques in Intrusion Detection Systems[C]//Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems, USA, 2005: 144-153.
|
[3] |
Modi C N, Patel D R, Patel A, et al.Bayesian Classifier and Snort based network intrusion detection system in cloud computing[C]//. Proceedings of 2012 International Conference on Computing Communication & Networking Technologies, India, 2012: 1-7.
|
[4] |
Kumar P, Nitin N, Sehgal V, et al.A novel approach for security in Cloud Computing using Hidden Markov Model and clustering[C]//. Proceedings of 2011 World Congress onInformation and Communication Technologies, India, 2011: 810-815.
|
[5] |
Vieira K, Schulter A, Westphall C, et al.Intrusion Detection for Grid and Cloud Computing[J]. It Professional (S1520-9202), 2010, 12(4): 38-43.
|
[6] |
袁凯. 云计算环境下的监控系统设计与实现[D]. 武汉: 华中科技大学, 2012.Yuan Kai. Design and Implementation of Monitoring System Based on Cloud[D]. Wuhan: Huazhong University of Science and Technology, 2012.
|
[7] |
范仕伦, 薛天俊, 夏玮. 基于贝叶斯算法和费舍尔算法的垃圾邮件过滤系统设计与实现[J]. 信息网络安全, 2012, 24(9): 18-22.Fan Shilun, Xun Tianjun, Xia Wei. Spam Email Filter System based on Bayesian Algorithm and Fisher Algorithm Design and Implementation[J]. Netinfo Security, 2012, 24(9): 18-22.
|
[8] |
赵姝, 吕靖, 张燕平. 不完整数据集的信息熵集成分类算法[J]. 模式识别与人工智能, 2014, 25(3): 193-198.Zhao Shu, Lv Jing, Zhang Yanping. Information Entropy Ensemble Classification Algorithm for Incomplete Data[J]. Pattern Recognition and Artificial Intelligence, 2014, 25(3): 193-198.
|
[9] |
李太福, 熊隽迪. 基于梯度下降法的自适应模糊控制系统研究[J]. 系统仿真学报, 2007, 19(6): 1265-1268.Li Taifu, Xiong Jundi. Study on Adaptive Fuzzy Control System Based on Gradient Descent Learning Algorithm. Journal of System Simulation, 2007, 19(6): 1265-1268.
|
[10] |
孙妮妮. 基于正态云模型重叠度的相似性度量研究及其应用[D]. 太原:太原理工大学, 2015.Sun Nini. Research and Application of Similarity Measurement between Normal Cloud Models based on Overlap Degree[D]. Taiyuan: Taiyuan University of Technology, 2015.
|
[11] |
张新有, 曾华燊, 贾磊. 入侵检测数据集KDD CUP99研究[J]. 计算机工程与设计, 2010, 31(22): 4809-4812.Zhang Xinyou, Zeng Huayi, Jia Lei. Research of intrusion detection system dataset-KDD CUP99[J]. Computer Engineering and Design, 2010, 31(22): 4809-4812.
|
[12] |
董元方, 李雄飞, 李军, 等. 基于分辨粒度的gROC曲线分析方法[J]. 软件学报, 2013, 24(1): 109-120.Dong Yuanfang, Li Xiongfei, Li Jun, et al. gROC Curve Analysis Method Based on Discernible Granularity. Journal of Software, 2013, 24(1): 109-120.
|
[13] |
刘敬, 谷利泽, 钮心忻, 等. 基于神经网络和遗传算法的网络安全事件分析方法[J]. 北京邮电大学学报, 2015, 38(2): 50-54.Liu Jing, Gu Lize, Niu Xinxin, et al. Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(2): 50-54.
|
[14] |
王飞, 秦小麟, 刘亮. 基于数据流的k-近邻连接算法[J]. 计算机科学, 2015, 42(5): 204-210.Wang Fei, Qin Xiaolin, Liu Liang. Algorithm for k-Nearest Neighbor Join Based on Data Stream[J]. Computer Science, 2015, 42(5): 204-210.
|