共 33 条
[11]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232
[12]
ETSI, 2012, 103125 ETSI
[14]
Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures
[J].
2013 IEEE 32ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2013),
2013,
:205-214
[15]
Heberlein LT, 1995, NETWORK SECURITY MON
[16]
FChain: Toward Black-box Online Fault Localization for Cloud Systems
[J].
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2013,
:21-30
[17]
Kang H., 2012, 2 USENIX WORKSH HOT
[18]
Kang H., 2010, P 7 INT C AUTONOMIC, P119, DOI [10.1145/1809049.1809070, DOI 10.1145/1809049.1809070]
[19]
Kawakami K, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), P418, DOI 10.1109/ICCE.2012.6161956