共 16 条
[1]
[Anonymous], IT CLOUD SERVICES 2
[2]
[Anonymous], 2011, Pei. data mining concepts and techniques
[3]
Ashraf M., 2010, INT J ADV COMPUTER S, V1
[4]
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[5]
Brown D.J., 2002, A Survey of Intrusion Detection Systems
[6]
Distributed Intrusion Detection in Clouds Using Mobile Agents
[J].
2009 THIRD INTERNATIONAL CONFERENCE ON ADVANCED ENGINEERING COMPUTING AND APPLICATIONS IN SCIENCES (ADVCOMP 2009),
2009,
:175-+
[7]
Dutkevych T, 2007, INT WORKSH INT DATA, P599
[8]
Lauzon Vincent-Philippe, DEP APPL MIGRATION 2
[9]
Lo C.C., 2008, First IEEE International Conference on Ubi-Media Computing, P280
[10]
Mazzariello Claudio, 2010, 2010 Sixth International Conference on Information Assurance and Security (IAS 2010), P265, DOI 10.1109/ISIAS.2010.5604069