共 46 条
- [1] Ali A.B.M.S., Smith K.A., On learning algorithm selection for classification, Journal on Applied Soft Computing, 6, 2, pp. 119-138, (2006)
- [2] Ali A.B.M.S., Wasimi S.A., Data Mining: Methods and Techniques, (2007)
- [3] Archer J., Boehm A., Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance 2009, (2009)
- [4] Archer J., Et al., Top Threats to Cloud Computing, (2010)
- [5] Bhel A., Emerging security challenges in cloud computing, 2011 World Congress on Information and Communication Technologies, pp. 217-222, (2011)
- [6] Brodkin J., Gartner: Seven Cloud-computing Security Risks, (2008)
- [7] Brunette G., Mogull R., Security Guidance for critical areas of focus in Cloud Computing V2. 1, 1, (2009)
- [8] Catteddu D., Hogben G., Benefits, Risks and Recommendations for Information Security, (2009)
- [9] Company H-P.D., HP ProLiant DL380 G4 Server-Specifications, (2012)
- [10] Fox A., Griffith R., Joseph A., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A., Stoica I., Above the Clouds: A Berkeley View of Cloud Computing, 13, (2009)