共 30 条
[1]
[Anonymous], 2013, CYBERSPACE SAFETY SE
[4]
Dijiang Huang, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P614, DOI 10.1109/INFCOMW.2011.5928886
[5]
Hammam A, 2013, 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), P31, DOI 10.1109/ICCES.2013.6707167
[7]
Trends in big data analytics
[J].
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING,
2014, 74 (07)
:2561-2573
[8]
Towards secure mobile cloud computing: A survey
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (05)
:1278-1299
[9]
Trust management on user behavioral patterns for a mobile cloud computing
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2013, 16 (04)
:725-731
[10]
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2015, 52
:125-136