共 12 条
[1]
Alfantookh A A, 2005, DOS ATTACKS INTELLIG
[3]
Exploiting Cloud and Workflow Patterns for the Analysis of Composite Cloud Services
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2017, 67
:255-265
[4]
[Anonymous], 1969, PERCEPTRONS INTRO CO
[5]
Barapatre P., TRAINING MEP NEURAL
[7]
Dujan, 2013, J ENG SCI TECHNOL, V8, P107
[8]
Grippo L., METODI OTTIMIZZAZION
[9]
Heba E. I., 2012, INT J COMPUTER APPL, V56
[10]
Jajodia S., 2016, J COMPUTER SECURITY, P1