Intrusion Detection Techniques Based on Improved Intuitionistic Fuzzy Neural Networks
暂无分享,去创建一个
[1] W. Kong,et al. Technique for image fusion between gray-scale visual light and infrared images based on NSST and improved RF , 2013 .
[2] W. Kong,et al. Technique for image fusion based on NSST domain INMF , 2014 .
[3] Farookh Khadeer Hussain,et al. A hybrid approach for the personalisation of cloud-based e-governance services , 2013, Int. J. High Perform. Comput. Netw..
[4] Pascal Bouvry,et al. A multi-objective approach for high quality tree-based backbones in mobile ad hoc networks , 2012, Int. J. Space Based Situated Comput..
[5] Gopinath Ganapathy,et al. A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment , 2014, Int. J. Grid Util. Comput..
[6] Klaus Zaerens,et al. Gaining the profits of cloud computing in a public authority environment , 2012, Int. J. Comput. Sci. Eng..
[7] Yang Lei,et al. Fusion technique for multi-focus images based on NSCT–ISCM , 2015 .
[8] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[9] Bo Hong,et al. Task scheduling in budget-constrained cloud computing systems to maximise throughput , 2012, Int. J. Comput. Sci. Eng..
[10] Dhiya Al-Jumeily,et al. Using adaptive neural networks to provide self-healing autonomic software , 2015, Int. J. Space Based Situated Comput..
[11] Hui Li,et al. Privacy-preserving logistic regression outsourcing in cloud computing , 2013, Int. J. Grid Util. Comput..
[12] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[13] Massimo Ficco. Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..
[14] Wei Ren,et al. A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function , 2014, Int. J. Comput. Sci. Eng..
[15] Xinfeng Ye,et al. Fine-grained access control for cloud computing , 2013, Int. J. Grid Util. Comput..
[16] Ning Han,et al. A novel power-conscious scheduling algorithm for data-intensive precedence-constrained applications in cloud environments , 2014, Int. J. High Perform. Comput. Netw..
[17] Jing Ma,et al. Virtual machine resource scheduling algorithm for cloud computing based on auction mechanism , 2016 .
[18] Christoph Sorge,et al. A privacy-friendly architecture for future cloud computing , 2013, Int. J. Grid Util. Comput..
[19] Nigel Thomas,et al. A Case Study in Inspecting the Cost of Security in Cloud Computing , 2015, UKPEW.
[20] Young-Sik Jeong,et al. Efficient Server Virtualization using Grid Service Infrastructure , 2010, J. Inf. Process. Syst..