[1] |
国家互联网应急中心. 2013年我国互联网网络安全态势综述[J/OL]. .National Internet Emergency Center. The overview of Ch na's Internet network security situation in 2013[J/OL]. .
|
[2] |
ANDERSO J P . Computer Security Threat Monitoring and Surveil-lance[P]. USA:PA 19034, 1980.4
|
[3] |
LI M . An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition[J]. Computers & Security, 2004,23(7): 549-558.
|
[4] |
王慧强, 杜晔, 庞永刚 . 入侵检测技术研究[J]. 计算机应用研究, 2003,10(20):90-94. WANG H Q , DU Y , PANG Y G . Research in intrusion detection tech-nology[J]. Application Research of Computers, 2003,10(20):90-94.
|
[5] |
DEREK S , GUAN Q , FU S . An anomaly detection framework for autonomic management of compute cloud systems[C]// Computer Software and Applications Conference Workshops (COMPSACW).Seoul, c2010:376-381.
|
[6] |
GUAN Q , ZHANG Z M , FU S . Ensemble of Bayesian predictors and decision trees for proactive failure management in clo computing systems[J]. Journal of Communications, 2012,7(1): 52-61.
|
[7] |
夏敏纳, 龚德良, 肖娟 . 一种面向可靠云计算的自适应故障检测方法[J]. 计算机应用研究, 2013,31(2):426-430. XIA M N , GONG D L , XIAO J . An adaptive fault detection method for reliable cloud computing[J]. Application Research of Compu-ting, 2013,31(2):426-430.
|
[8] |
HUSANBIR S , LIU J G , GUAN Q . AFD:adaptive failure detection system for cloud computing infrastructures[C]// Performance Computing and Communications Conference(IPCCC). Austin,TX, c2012:71-80.
|
[9] |
ZHU Q , TERESA T , XIE Q . Automatic fault diagnosis in cloud infra-structure[C]// Cloud Computing Technology and Science(CloudCom). Bristol, c2013:467-474.
|
[10] |
GUAN Q , FU S . Adaptive anomaly identification by exploring metric subspace in cloud computing infrastructures[C]// Reliable Distributed Systems(SRDS). Braga, c2013:205-214.
|
[11] |
李娜, 赵慧洁, 贾国瑞 . 因子分析模型的高光谱数据降维方法[J]. 中国图象图形学报, 2011,16(11):2030-2035. LI N , ZHAO H J , JIA G R . Hyperspectral data dimensiona ity reduc-tion method based factor analysis model[J]. Journal Image and Graph-ics, 2011,16(11):2030-2035.
|
[12] |
李乐, 章毓晋 . 非负矩阵分解算法综述[J]. 电子学报, 2008(4):737-743. LI L , ZHANG Y J . Summary of non-negative matrix factorization al-gorithm[J]. Chinese Journal of Electronics, 2008(4):737-743.
|
[13] |
蓝荣祎, 孙怀江 . 基于逆运动学和重构式 ICA 的人体运动风格分析与合成[J]. 自动化学报, 2014,40(6):1135-1147. LAN R W , SUN H J . The style analysis and synthesis of uman mo-tion based on inverse kinematics and reconstruction type of ICA[J]. Acta Automatica Sinica, 2014,40(6):1135-1147.
|
[14] |
荣宏, 王会梅, 鲜明 . 基于快速独立成分分析的RoQ攻击检测方法[J]. 电子与信息学报, 2013,35(10):2307-2313. RONG H , WANG H M , XIAN M . A method of RoQ attack detection based on FastICA[J]. Journal of Electronics & Information Technolo-gy, 2013,35(10):2307-2313.
|
[15] |
吴逊 . 基于独立成分分析的特征提取方法研究[D]. 厦门: 厦门大学, 2007. WU X . The Research on Features Extraction Method Based on In-dependent Component Analysis[D]. Xiamen: Xiamen University, 2007.
|
[16] |
张卷美 . 一种新的迭代收敛阶数的证明与推广[J]. 大学数学, 2007,23(6):135-139. ZHANG J M . A new proof and promotion of iteration convergence order[J]. College Mathematics, 2007,23(6):135-139.
|
[17] |
于明明, 张妍 . 牛顿迭代法与几种改进格式的效率指数[J]. 数学的实践与认识, 2008,38(18):154-159. YU M M , ZHANG Y . The efficiency index of Newton iterative me-thod and serveral improve formats[J]. Journal of Mathe tics in Prac-tice and Theory, 2008,38(18):154-159.
|
[18] |
范雪莉, 冯海泓, 原猛 . 基于互信息的主成分分析特征选择算法[J]. 控制与决策, 2013,28(6):915-919. FAN X L , FENG H H , YUAN M . Principal components analysis based on mutual information for feature selection algorithm[J]. Con-trol and Decision, 2013,28(6):915-919.
|