[1] |
WANG W , GAO N , JIANG L N . Security demands analysis of cloud computing[C]//The 27th National Conference on Computer Security. 2012:75-78.
|
[2] |
HE B H , LI J . Present situation and prospect of the development of China's cloud computing[J]. Telecommunications Technology, 2012(1):22-24.
|
[3] |
ZHANG H , LU K . Building security check and risk assessment index system on cloud computing environment[J]. Netinfo security, 2014(9):115-119.
|
[4] |
WANG X Z , MA Y . nformation security risk assessment of cloud computing[J]. Computer Security, 2014(9):37-40.
|
[5] |
罗东俊 . 基于可信计算的云计算安全若干关键问题研究[D]. 广州: 华南理工大学, 2014. LUO D J . Research on key issues in cloud computing security based on trusted computing[D]. Guangzhou: South China University of Technology, 2014.
|
[6] |
ZHOU W J . Research on demand analysis of cloud computing security in high speed charging[J]. Transpo World, 2015(24):132-133.
|
[7] |
WEI W , YANG X L , SHEN P Y , et al. Holes detection in anisotropic sensornets:topological methods[J]. International Journal of Distrib-uted Sensor Networks, 2012,2012.
|
[8] |
HU W , LONG Q H , QIAN M , et al. Determnation of evaluation index system weight for enterprises wasterwater treatment based on AHP[J]. Environmental Pollution & Control, 2014,36(2):88-95.
|
[9] |
CHEN X H , YANG Z H . The study credit evaluation system based on improved fuzzy evaluation method[J]. Chinese Journal of Manage-ment Science, 2015,23(1):146-153.
|
[10] |
YANG J , WANG Z Q . Post-benefit evaluation of land consolidation project implementation based on ahp and fuzzy comprehensive evalua-tion[J]. Resources and Environment in the Yangtze Basin, 2013,22(8):1036-1042.
|
[11] |
WEI W , XU Q , WANG L , et al. GI/Geom/1 queue based on commu-nication model for mesh networks[J]. International Journal of Com-munication Systems, 2014,27(11):3013-3029.
|
[12] |
WEI W , QI Y . Information potential fields navigation in wireless ad-hoc sensor networks[J]. Sensors, 2011,11(5):4794-4807.
|
[13] |
JIANG X , HE X X . The Third research institute of ministry of public security[J]. Microcomputer Applications, 2014,30(2):30-34.
|