[1] |
王建民, 尹建伟, 窦万春 . 业务过程管理技术专题前言[J]. 软件学报, 2015,26(3): 447-448. WANG J M , YIN J W , DOU W C . Business process management technology thematic introduction[J]. Journal of Software, 2015,26(3): 447-448.
|
[2] |
孟小峰, 慈祥 . 大数据管理:概念、技术与挑战[J]. 计算机研究与发展, 2013,50(1): 146-169. MENG X F , CI X . Big data management:concepts,techniques and challenges [J]. Journal of Computer Research and Development, 2013,50(1): 146-169.
|
[3] |
王宇 . 自主可控系统安全防护技术的现状与对策[J]. 保密科学技术, 2014(12): 24-30. WANG Y . Current situation and countermeasures for independent and controllable system security technology[J]. Secrecy Science and Technology, 2014(12): 24-30.
|
[4] |
袁健, 陈冬露 . 云环境中基于动态监测周期的动态资源管理模型[J]. 小型微型计算机系统, 2016,37(3): 474-478. YUAN J , CHEN D L . Resource management strategic model based on dynamic monitoring period in cloud environment[J]. Journal of Chinese Computer Systems, 2016,37(3): 474-478.
|
[5] |
SHI J , LI H , ZHOU L D.The technical security issues in cloud computing . International Journal of Information and Communication Technology[J]. 2013,5(3-4): 272-282.
|
[6] |
NWOBODO I , JAHANKHANI H , EDOH A . Security challenges in the distributed cloud computing[J]. International Journal of Electronic Security and Digital Forensics, 2014,6(1): 38-51.
|
[7] |
CHEN G , WU S , WANG Y . The evolvement of big data systems:from the perspective of an information security application[J]. Big Data Research, 2015,2(2): 65-73.
|
[8] |
王帅, 汪来富, 金华敏 ,等. 网络安全分析中的大数据技术应用[J]. 电信科学, 2015,31(7): 139-144. WANG S , WANG L F , JIN H M ,et al. Big data application in network security analysis[J]. Telecommunications Science, 2015,31(7): 139-144.
|
[9] |
胡小梅, 刘嘉勇 . 基于DNS劫持的流量监测系统设计与实现[J]. 网络安全技术与应用, 2016(1): 110-112. HU X M , LIU J Y . Design and implementation of traffic monitoring system based on DNS [J]. Network Security Technology & Application, 2016(1): 110-112.
|
[10] |
MOHAIMENUZZAMAN M , RAHMAN S M M . A design pattern for real time progress monitoring of a time-intensive process in a stateless software application[J]. International Journal of Software Engineering,Technology and Applications, 2015,1(1): 53-63.
|
[11] |
CASOLA V , BENEDICTIS A D , DRAGO A ,et al. SeNsiM-SEC:secure sensor networks integration to monitor rail freight transport[J]. International Journal of System of Systems Engineering, 2013,4(4): 291-316.
|
[12] |
王一川, 马建峰, 卢笛 ,等. 面向云环境内部DDoS 攻击检测的博弈论优化[J]. 计算机研究与发展, 2015,52(8): 1873-1882. WANG Y C , MA J F , LU D ,et al. Game optimization for internal DDoS attack detection in cloud computing[J]. Journal of Computer Research and Development, 2015,52(8): 1873-1882.
|
[13] |
KIM S K , . JenniferSoft:APM software development leader in Korea[J]. International Journal of Teaching and Case Studies, 2015,6(2): 95-107.
|
[14] |
JAIN M,PREETI , . Availability analysis of software rejuvenation in active/standby cluster system[J]. International Journal of Industrial and Systems Engineering, 2015,19(1): 75-93.
|
[15] |
GAUR V , SONI A . A knowledge-driven approach for specifying the requirements of multi-agent system[J]. International Journal of Business Information Systems, 2015,19(3): 300-323.
|
[16] |
CAROL S S , SHI Y . Predicting residual software fault content and their location during multi-phase functional testing using test coverage[J]. International Journal of Reliability and Safety, 2013,7(1): 32-57.
|