共 39 条
[21]
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach
[J].
2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC),
2018,
[22]
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning
[J].
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11,
2011,
:757-764
[24]
Li Z, 2012, INT CONF CLOUD COMPU, P75, DOI 10.1109/CCIS.2012.6664371
[25]
Loog Marco., 1999, APPROXIMATE PAIRWISE
[27]
Mahmood Z., 2012, International Journal of Research in Computer Engineering and Electronics, V1, P1
[28]
Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing
[J].
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012],
2012, 1
:905-912
[29]
Muche EW, 2016, THESIS
[30]
MUTHURAJKUMAR S, 2015, AUST J BASIC APPL SC, V9, P38