共 60 条
[1]
Vieira K(2010)Intrusion detection for grid and cloud computing IT Prof. 12 38-43
[2]
Subashini S(2011)A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1-11
[3]
Kavitha V(1975)The concept of a linguistic variable and its application to approximate reasoning I Inf. Sci. 8 199-249
[4]
Zadeh LA(2001)Centroid of a type-2 fuzzy set Inf. Sci. 132 195-220
[5]
Karnik NN(2009)Robust control of an LUSM-Based XY θ motion control stage using an adaptive interval Type-2 fuzzy neural network IEEE Trans. Fuzzy Syst. 17 24-38
[6]
Mendel JM(2013)Machine learning approach for intrusion detection on cloud virtual machines Int. J. Appl. Innov. Eng. Manag. 2 56-66
[7]
Lin Faa-Jeng(2010)An intelligent intrusion detection system using genetic algorithms and features selection Majlesi J. Electr. Eng. 4 33-43
[8]
Chou Po-Huan(1997)Multi-stage genetic fuzzy systems based on the iterative rule learning approach Mathw. Soft Comput. 4 233-249
[9]
Shieh Po-Huang(1998)A genetic-based neuro-fuzzy approach for modeling and control of dynamical systems IEEE Trans. Neural Netw. 9 756-767
[10]
Chen Syuan-Yi(1975)An experiment in linguistic synthesis with a fuzzy logic controller Int. J. Man Mach. Stud. 7 1-13