Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 378-380.
Previous Articles Next Articles
XIE Li-chun and ZHANG Chun-qin
[1] Varadharajan V,Tupakula U.Counteracting security attacks in virtual machines in the cloud using property based attestation[J].Journal of Network and Computer Applications,2014,40(7):31-45 [2] Younis Y A,Kifayat K,Merabti M.An access control model for cloud computing [J].Journal of Information Security and Applications,2014,19(1):45-60 [3] 杨宏宇,常媛.基于K均值多重主成分分析的App-DDoS检测方法[J].通信学报,2014,35(5):16-24 [4] Yu Yong,Niu Lei,Yang Guo-min,et al.On the security of auditing mechanisms for secure cloud storage [J].Future Generation Computer Systems,2014,30(1):127-132 [5] 王会梅,鲜明,王国玉.基于扩展网络攻击图的网络攻击策略生成算法[J].电子与信息学报,2011,33(12):3015-3021 [6] 谢柏林,余顺争.基于应用层协议分析的应用层实时主动防御系统[J].计算机学报,2011,34(3):452-463 [7] 程宏兵,容淳铭,黄晓,等.高效的攻击检测与数据融合算法[J].通信学报,2012,33(9):85-94 [8] 张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-175 [9] 席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法 [J].计算机学报,2014,31(3):95-101 [10] 储泽楠,李世扬.基于节点生长马氏距离K均值和HMM的网络入侵检测方法设计[J].计算机测量与控制,2014,37(10):1-12 [11] 张冰涛,王小鹏.面向 WSN 安全路由协议的自适应威胁模型[J].计算机应用研究,2014,31(4):1208-1211 [12] Vissers T,Somasundaram T S,Pieters L,et al.DDoS defense system for Web services in a cloud environment [J].Future Generation Computer Systems,2014,37:37-45 [13] 朱建明,宋彪,黄启发.基于系统动力学的网络安全攻防演化博弈模型[J].通信学报,2014,5(1):54-61 [14] 刘禹,李德毅,张光卫,等.云模型雾化特性及在进化算法中的应用[J].电子学报,2009,37(8):1651-1658 [15] 张亚玲,韩照国,任娇霞.基于相对熵理论的多测度网络异常检测方法[J].计算机应用,2010,30(7):1771-1774 [16] Worku S G,Xu Chun-xiang,Zhao Ji-ning,et al.Secure and efficient privacy-preserving public auditing scheme for cloud storage [J].Computers & Electrical Engineering,2014,40(5):1703-1713 |
No related articles found! |
|