Conceptual Modelling of Complex Network Management Systems
暂无分享,去创建一个
Francisco Maciá Pérez | Iren Lorenzo-Fonseca | José Vicente Berná-Martínez | José Manuel Sánchez-Bernabeu | F. M. Pérez | Iren Lorenzo-Fonseca | J. Berná-Martínez
[1] Nicola Guarino,et al. Business Process Management , 2016, Business & Information Systems Engineering.
[2] Mokdong Chung,et al. Adaptive security management model in the cloud computing environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[3] Martin Gogolla. Unified Modeling Language , 2009, Encyclopedia of Database Systems.
[4] Haifeng Chen,et al. Discovering likely invariants of distributed transaction systems for autonomic system management , 2006, 2006 IEEE International Conference on Autonomic Computing.
[5] Mariacristina Roscia,et al. Smart City by multi-agent systems , 2013, 2013 International Conference on Renewable Energy Research and Applications (ICRERA).
[6] Evangelos P. Markatos,et al. Emulation-Based Detection of Non-self-contained Polymorphic Shellcode , 2007, RAID.
[7] Hervé Debar,et al. Intrusion Detection: Introduction to Intrusion Detection and Security Information Management , 2005, FOSAD.
[8] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[9] Howard Smith,et al. Business Process Management: The Third Wave , 2003 .
[10] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[11] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[12] E. Ronco,et al. The enhanced Telecom Operations Map™ (eTOM) Business Process Framework , 2002 .
[13] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[14] Yuan Ge,et al. Efficient Invariant Search for Distributed Information Systems , 2013, 2013 IEEE 13th International Conference on Data Mining.
[15] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[16] Peter Fettke,et al. Business Process Modeling Notation , 2008, Wirtschaftsinf..
[17] Diego Marcos-Jorquera,et al. A New Paradigm: Cloud Agile Manufacturing , 2012 .
[18] Christopher Krügel,et al. Intrusion Detection and Correlation - Challenges and Solutions , 2004, Advances in Information Security.
[19] Ivar Jacobson,et al. The unified modeling language reference manual , 2010 .
[20] Francisco Maciá Pérez,et al. Network Intrusion Detection System Embedded on a Smart Sensor , 2011, IEEE Transactions on Industrial Electronics.
[21] Marta Indulska,et al. Business Process Modeling- A Comparative Analysis , 2009, J. Assoc. Inf. Syst..
[22] Zhenkai Liang,et al. Automatic generation of buffer overflow attack signatures: an approach based on program behavior models , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[23] John Jeston,et al. Business Process Management: Practical Guidelines to Successful Implementations , 2006 .
[24] Cheng Wang,et al. Android-based Vehicular Distributed Intelligent Video Collection System , 2014, J. Networks.
[25] Guofei Jiang,et al. Extracting Overlay Invariants of Distributed Systems for Autonomic System Management , 2010, 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems.
[26] Forum TeleManagement,et al. Enhanced Telecom Operations Map (eTOM) The Business Process Framework Addendum T : eTOM to M. 3400 Mapping Application Note , 2004 .
[27] Francisco Maciá Pérez,et al. Energy Management System as an Embedded Service: Saving Energy Consumption of ICT , 2009, ARCS.
[28] Manfred Reichert,et al. Modeling Business Objectives for Business Process Management , 2012, S-BPM ONE.
[29] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[30] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..