共 29 条
[1]
[Anonymous], SPECIAL PUBLICATION
[2]
[Anonymous], 2011, Pei. data mining concepts and techniques
[3]
Bace R., 2001, TECHNICAL REPORT, P800
[4]
Bahram S., 2010, P 29 IEEE INT S REL
[5]
Bakshi A., 2010 2 INT C COMM SO, P260
[6]
Bharadwaja S., 2011, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), P695, DOI 10.1109/ITNG.2011.123
[7]
Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
[8]
Distributed Intrusion Detection in Clouds Using Mobile Agents
[J].
2009 THIRD INTERNATIONAL CONFERENCE ON ADVANCED ENGINEERING COMPUTING AND APPLICATIONS IN SCIENCES (ADVCOMP 2009),
2009,
:175-+
[9]
Dhage S.N., 2011, International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) ' TCET, P235
[10]
Dhanalakshmi Y, 2008, INT J COMPUT SCI NET, V8, P27