共 39 条
[1]
Legg S.(2007)Universal intelligence: A definition of machine intelligence Minds Mach. 17 391-444
[2]
Hutter M.(2015)On the potential applications of data mining for information security provision of cloud-based environments Autom. Doc. Math. Linguist. 49 193-201
[3]
Grusho A.A.(2015)Creation of data mining cloud service on the actor mode Internet Things, Smart Spaces, Next Gener. Networks Syst. 9247 585-599
[4]
Zabezhailo M.I.(2013)Detection of network attacks and selection of countermeasures in cloud systems Izv. YuFU, Tekh. Nauki 12 94-101
[5]
Zatsarinnyi A.A.(1976)The notions of consistency and predicate locks in a database system Commun. ACM 19 624-633
[6]
Piskovskii V.O.(2011)Consistent updates for software-defined networks: Change you can believe in! HOTNETS '11 7 1-6
[7]
Borokhov S.V.(2016)Secure automatic reconfiguration of cloud computing environments Sist. Sredstva Inf. 26 83-92
[8]
Kholod I.(2015)Control and management of information flows in the cloud environment Inf. Primen. 9 95-101
[9]
Petuhov I.(2016)One method of reducing computations in the formation of Galois closures Inf. Primen. 10 97-106
[10]
Kapustin N.(2015)Analysis of threats and methods of protection of cloud services Molodii Vchenii 12 38-43