[1] |
陆嘉恒 . Hadoop实战[M]. 北京: 机械工业出版社, 2012.
|
|
LU J H . Hadoop in action[M]. Beijing: China Machine Press, 2012.
|
[2] |
GUPTA C , SINHA R , ZHANG Y . Eagle:user profile-based anomaly detection for securing Hadoop clusters[C]// IEEE International Conference on Big Data. 2015: 1336-1343.
|
[3] |
TAN Z , TANG Z , LI R ,et al. Research on trust-based access control model in cloud computing[C]// Information Technology and Artificial Intelligence Conference. 2011: 339-344.
|
[4] |
JING X , LIU Z , LI S ,et al. A cloud-user behavior assessment based dynamic access control model[J]. International Journal of System Assurance Engineering & Management, 2015,22(12): 1-10.
|
[5] |
ZBURIVSKY D . Hadoop集群与安全[M]. 北京: 机械工业出版社, 2014.
|
|
ZBURIVSKY D . Hadoop cluster deployment,securing Hadoop[M]. Beiing: China Machine Press, 2014.
|
[6] |
JAIGANESH M , AARTHI M , KUMAR A V A . Fuzzy ART-based user behavior trust in cloud computing[J]. Advances in Intelligent Systems& Computing, 2015,324: 341-348.
|
[7] |
CHUA S L , MARSLAND S , GUESGEN H W . Unsupervised learning of patterns in data streams using compression and edit distance[C]// The International Joint Conference on Artificial Intelligence. 2011: 1231-1236.
|
[8] |
KRANEN P , KREMER H , JANSEN T ,et al. Stream data mining using the MOA framework[C]// International Conference on Database Systems for Advanced Applications. 2012: 309-313.
|
[9] |
王昕, 袁超伟, 黄晨 . 基于滑动窗口机制的 RFID 自同步可扩展所有权变更协议[J]. 北京邮电大学学报, 2013,36(5): 30-35.
|
|
WANG X , YUAN C W , HUANG C . Scalable and self-synchronizable RFID ownership transfer protocol based on the sliding window mechanism[J]. Journal of Beijing University of Posts and Telecommunications, 2013,36(5): 30-35.
|
[10] |
MAXION R A , TOWNSEND T N . Masquerade detection using truncated command lines[C]// International Conference on Dependable Systems and Networks. 2002: 219-228.
|
[11] |
TIAN X G , DUAN M Y , LI W F ,et al. Anomaly detection of user behavior based on shell commands and homogeneous Markov chains[J]. Chinese Journal of Electronics, 2007,17(2): 231-236.
|
[12] |
李超, 田新广, 肖喜 ,等. 基于 Shell 命令和共生矩阵的用户行为异常检测方法[J]. 计算机研究与发展, 2012,49(9): 1982-1990.
|
|
LI C , TIAN X G , XIAO X ,et al. Anomaly detection of user behavior based on shell commands and commands and co-occurrence matrix[J]. Journal of Computer Research and Development, 2012,49(9): 1982-1990.
|